<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[CyberMaterial: Cyber Briefing]]></title><description><![CDATA[Welcome to Cyber Briefing, the newsletter that informs you about the latest cybersecurity advisories, alerts, incidents and news every weekday.
First time seeing this? Please subscribe.]]></description><link>https://www.cybermaterial.com/s/cyberbriefing</link><image><url>https://substackcdn.com/image/fetch/$s_!nNgF!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6c57d21-5644-4f88-bf07-ea44d2603e80_482x482.png</url><title>CyberMaterial: Cyber Briefing</title><link>https://www.cybermaterial.com/s/cyberbriefing</link></image><generator>Substack</generator><lastBuildDate>Wed, 20 May 2026 00:12:44 GMT</lastBuildDate><atom:link href="https://www.cybermaterial.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[CyberMaterial]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[cybermaterial@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[cybermaterial@substack.com]]></itunes:email><itunes:name><![CDATA[CyberMaterial]]></itunes:name></itunes:owner><itunes:author><![CDATA[CyberMaterial]]></itunes:author><googleplay:owner><![CDATA[cybermaterial@substack.com]]></googleplay:owner><googleplay:email><![CDATA[cybermaterial@substack.com]]></googleplay:email><googleplay:author><![CDATA[CyberMaterial]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Cyber Briefing: 2026.05.19]]></title><description><![CDATA[The convergence of failed critical security updates, dozens of newly discovered zero-day exploits, and large-scale academic data breaches highlights a high-risk environment currently being countered]]></description><link>https://www.cybermaterial.com/p/cyber-briefing-20260519</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cyber-briefing-20260519</guid><dc:creator><![CDATA[CyberMaterial]]></dc:creator><pubDate>Tue, 19 May 2026 14:00:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Hro1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96266e15-eb50-4be1-97ff-28b612be86b1_700x394.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Hro1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96266e15-eb50-4be1-97ff-28b612be86b1_700x394.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Hro1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96266e15-eb50-4be1-97ff-28b612be86b1_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!Hro1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96266e15-eb50-4be1-97ff-28b612be86b1_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!Hro1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96266e15-eb50-4be1-97ff-28b612be86b1_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!Hro1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96266e15-eb50-4be1-97ff-28b612be86b1_700x394.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Hro1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96266e15-eb50-4be1-97ff-28b612be86b1_700x394.png" width="700" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/96266e15-eb50-4be1-97ff-28b612be86b1_700x394.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:424220,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/198255291?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96266e15-eb50-4be1-97ff-28b612be86b1_700x394.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Hro1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96266e15-eb50-4be1-97ff-28b612be86b1_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!Hro1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96266e15-eb50-4be1-97ff-28b612be86b1_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!Hro1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96266e15-eb50-4be1-97ff-28b612be86b1_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!Hro1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96266e15-eb50-4be1-97ff-28b612be86b1_700x394.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Welcome to Cyber Briefing, your daily source for all things cybersecurity. We bring you the latest advisories, alerts, incidents, and news every weekday.</p><p style="text-align: justify;">The technical landscape has been shaken by the discovery of <strong>47 zero-day vulnerabilities</strong> during the Pwn2Own Berlin competition, targeting critical infrastructure like Microsoft Exchange and VMware ESXi. This massive find coincides with a significant <strong>Windows 11 update failure (Error 0x800f0922)</strong> for the May 2026 security patch, leaving many enterprise systems temporarily unpatched and exposed. Meanwhile, a widespread <strong>data breach at multiple universities</strong> has compromised sensitive student information, a failure attributed to system configuration errors that underscores the persistent risks in the educational sector&#8217;s digital infrastructure.</p><p style="text-align: justify;">On the defensive and regulatory front, <strong>INTERPOL&#8217;s Operation Ramz</strong> successfully dismantled cybercrime networks across the MENA region, resulting in 201 arrests and the seizure of dozens of servers used for phishing and malware. This shift toward proactive security is also reflected in the development of <strong>AI-powered testing frameworks</strong> that have significantly improved vulnerability detection, boasting a 95% success rate in identifying input validation flaws. Additionally, regional efforts like the <strong>Philippine government&#8217;s cybersecurity training</strong> initiatives are addressing the &#8220;human element&#8221; of security, aiming to mitigate the social engineering and password errors that currently account for nearly all regional data breaches.</p><p>Listen to our podcast here &#9196;</p><p><a href="https://open.spotify.com/episode/5gDnSZv9irhO9hjU2A3HGL?si=1e6BdWsZSsiz9VVMLWUrww">PODCAST</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zkJR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" width="1456" height="223" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:223,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://amzn.to/3Kw14fw&quot;,&quot;text&quot;:&quot;Get BlueSleuth-Lite&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://amzn.to/3Kw14fw"><span>Get BlueSleuth-Lite</span></a></p><div><hr></div><h2>&#9889;THREAT LANDSCAPE</h2><div><hr></div><p><strong>Windows 11 Update Failure Error 0x800f0922</strong></p><p>Microsoft has confirmed that the May 2026 cumulative update (KB5089549) for Windows 11 versions 24H2 and 25H2 is failing to install on affected systems, generating error code 0x800f0922. The issue, acknowledged after the May 12, 2026 release, prevents users from receiving important security patches. Enterprise administrators and individual users should monitor Microsoft&#8217;s official support channels for a resolution and workaround guidance. <a href="https://www.cybermaterial.com/p/windows-11-update-failure-error-0x800f0922">Read More</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!llmP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.youtube.com/@cybermaterial&quot;,&quot;text&quot;:&quot;Subscribe Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.youtube.com/@cybermaterial"><span>Subscribe Now</span></a></p><div><hr></div><h2><strong>&#128680;INCIDENTS &amp; REAL-WORLD IMPACT</strong></h2><div><hr></div><p><strong>Massive student data breach at universities</strong></p><p>A significant data breach has exposed student information at multiple universities, highlighting security vulnerabilities as remote learning increases. Cybersecurity firm Proofpoint identified the breach, which appears linked to configuration issues in university systems. Educational institutions should immediately review their security settings and access controls to protect student data. <a href="https://www.cybermaterial.com/p/massive-student-data-breach-at-universities">Read More</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MGQE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><h2><strong>&#128275; EXECUTIVE RISK &amp; CYBERNOMICS</strong></h2><div><hr></div><p><strong>AI Agents for Web Testing &amp; Security Validation</strong></p><p>Researchers have developed an AI-powered testing framework that automatically generates and maintains web application tests while also detecting security vulnerabilities through natural language commands. The system improved test creation success rates from 55% to 93% and reduced timing errors by 80% across 176 test scenarios in production applications. The framework can also identify security flaws by converting plain English attack descriptions into browser-based security probes, detecting 85% of authentication bypass issues and 95% of input validation problems. <a href="https://www.cybermaterial.com/p/ai-agents-for-web-testing-and-security">Read More</a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f7lS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" width="1456" height="349" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:349,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69329,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195026538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/services/&quot;,&quot;text&quot;:&quot;Get Help&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/services/"><span>Get Help</span></a></p><div><hr></div><h2><strong>&#128737;&#65039; POLICY, REGULATION &amp; LEGAL SIGNALS</strong></h2><div><hr></div><p><strong>INTERPOL Operation Ramz: 201 arrested in MENA cybercrime</strong></p><p>INTERPOL coordinated Operation Ramz across the Middle East and North Africa, targeting phishing campaigns, malware distribution, and cyber scams. The operation led to 201 arrests and identified 382 additional suspects, with authorities seizing 53 servers and equipment containing banking data and phishing tools. Law enforcement identified 3,867 victims affected by these cybercrime networks. <a href="https://www.cybermaterial.com/p/interpol-operation-ramz-201-arrested">Read More</a></p><div><hr></div><h2><strong>&#128187; CAREER ENABLEMENT</strong></h2><div><hr></div><p><strong>Philippine Gov&#8217;t IOs Receive Cybersecurity Training</strong></p><p>Philippine government information officers in Region 6 received cybersecurity training on April 29, 2025, focusing on human factors in digital security. Experts from the Department of Information and Communications Technology and Regional Anti-Cybercrime Group 6 emphasized that 95 percent of data breaches stem from human error, with scams now the top cybercrime in the region. Information officers were identified as high-value targets due to their access to official social media accounts and sensitive agency data, with training covering password security, multi-factor authentication, and social engineering awareness. <a href="https://www.cybermaterial.com/p/philippine-govt-ios-receive-cybersecurity">Read More</a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HL0l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><a href="https://www.cybermaterial.com/s/documents">Click Here To Read</a></p><div><hr></div><p>Copyright &#169; 2026 <a href="http://cybermaterial.com/">CyberMaterial</a>. All Rights Reserved.</p><p style="text-align: justify;">Follow CyberMaterial on:</p><p style="text-align: justify;"><a href="https://www.cybermaterial.com/">Substack</a>,<a href="https://www.linkedin.com/company/cybermaterial/"> LinkedIn</a>,<a href="https://twitter.com/cybermaterial_"> Twitter</a>,<a href="https://www.reddit.com/r/cybermaterial/"> Reddit</a>,<a href="https://instagram.com/Cybermat3rial"> Instagram</a>,<a href="https://www.facebook.com/cybermaterial"> Facebook</a>,<a href="https://www.youtube.com/@cybermaterial"> YouTube</a>, and<a href="https://cybermaterial.medium.com/"> Medium</a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Cyber Briefing: 2026.05.16]]></title><description><![CDATA[Threat actors are increasingly exploiting automated tools and supply chain vulnerabilities, forcing a global shift toward more resilient AI governance and defense-in-depth browser security.]]></description><link>https://www.cybermaterial.com/p/cyber-briefing-20260516</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cyber-briefing-20260516</guid><dc:creator><![CDATA[CyberMaterial]]></dc:creator><pubDate>Mon, 18 May 2026 14:03:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!LKFO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d196f64-ab7f-4b41-8d91-e81c7bb6fe28_700x394.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LKFO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d196f64-ab7f-4b41-8d91-e81c7bb6fe28_700x394.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LKFO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d196f64-ab7f-4b41-8d91-e81c7bb6fe28_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!LKFO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d196f64-ab7f-4b41-8d91-e81c7bb6fe28_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!LKFO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d196f64-ab7f-4b41-8d91-e81c7bb6fe28_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!LKFO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d196f64-ab7f-4b41-8d91-e81c7bb6fe28_700x394.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LKFO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d196f64-ab7f-4b41-8d91-e81c7bb6fe28_700x394.png" width="700" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8d196f64-ab7f-4b41-8d91-e81c7bb6fe28_700x394.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:64287,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/198250990?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d196f64-ab7f-4b41-8d91-e81c7bb6fe28_700x394.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LKFO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d196f64-ab7f-4b41-8d91-e81c7bb6fe28_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!LKFO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d196f64-ab7f-4b41-8d91-e81c7bb6fe28_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!LKFO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d196f64-ab7f-4b41-8d91-e81c7bb6fe28_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!LKFO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d196f64-ab7f-4b41-8d91-e81c7bb6fe28_700x394.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Welcome to Cyber Briefing, your daily source for all things cybersecurity. We bring you the latest advisories, alerts, incidents, and news every weekday.</p><p style="text-align: justify;">Recent cyber activity has been marked by sophisticated espionage campaigns and significant policy shifts. The <strong>Paper Werewolf</strong> threat group (also known as GOFFEE) has been aggressively targeting Russian industrial and financial sectors using phishing PDFs to deliver the <strong>EchoGather RAT</strong> through deceptive Adobe and <strong>Starlink</strong> installers. Simultaneously, <strong>Microsoft</strong> is overhauling Edge&#8217;s security architecture in build 148 to prevent plaintext password storage in memory, a move intended to block credential theft from compromised systems. Meanwhile, the <strong>Linux kernel</strong> community is grappling with a flood of AI-generated bug reports, leading maintainers to reclassify these submissions as public issues rather than confidential zero-days to manage the overwhelming volume of duplicate findings.</p><p style="text-align: justify;">In the realm of governance and research, the <strong>UK&#8217;s NCSC</strong> and its Five Eyes partners have issued critical guidance on <strong>agentic AI</strong>, warning that the autonomy of these systems requires strict human oversight and &#8220;least privilege&#8221; access to prevent unpredictable escalations. This focus on AI safety mirrors findings from <strong>Pwn2Own Berlin 2026</strong>, where researchers secured nearly $1.3 million by uncovering 47 zero-days, many within AI-integrated software and cloud infrastructure. On the incident front, <strong>Grafana Labs</strong> reported a codebase breach and subsequent extortion attempt after an attacker compromised a GitHub token; however, the company has refused to pay the ransom, maintaining that customer data remains secure.</p><p>Listen to our podcast here &#9196;</p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8a426b057dd2e0c473f0f32288&quot;,&quot;title&quot;:&quot;May 18, 2026 - Cyber Briefing&quot;,&quot;subtitle&quot;:&quot;CyberMaterial&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/2iXDVcWbL1E47n0ow0b23v&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/2iXDVcWbL1E47n0ow0b23v" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zkJR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" width="1456" height="223" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:223,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://amzn.to/3Kw14fw&quot;,&quot;text&quot;:&quot;Get BlueSleuth-Lite&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://amzn.to/3Kw14fw"><span>Get BlueSleuth-Lite</span></a></p><div><hr></div><h2>&#9889;THREAT LANDSCAPE</h2><div><hr></div><p><strong>Paper Werewolf APT Spreads EchoGather RAT</strong></p><p>A Russian-language threat group called Paper Werewolf (also known as GOFFEE) has targeted Russian industrial, financial, and transport organizations with phishing attacks between March and April 2026. The campaign uses PDF attachments containing URLs that lead to ZIP archives, ultimately delivering the EchoGather remote access trojan (RAT) disguised as an Adobe installer. Organizations in these sectors should implement email filtering, user awareness training, and endpoint detection to identify and block this multi-stage infection chain. <strong><a href="https://www.cybermaterial.com/p/paper-werewolf-apt-spreads-echogather">Read More</a></strong></p><p><strong>Microsoft Edge fixes plaintext password storage</strong></p><p>Microsoft Edge will stop loading all saved passwords into memory as plaintext at browser startup, a practice unique among Chromium-based browsers that made credential theft easier for attackers with system access. The change, already live in Edge Canary and rolling out to all channels in build 148 and newer, means passwords will only be decrypted when needed for autofill or password management. Users should still treat browser password managers as convenience tools rather than maximum-security vaults, enable multi-factor authentication where possible, and avoid storing highly sensitive data like credit card details in browsers. <strong><a href="https://www.cybermaterial.com/p/microsoft-edge-fixes-plaintext-password">Read More</a></strong></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!llmP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.youtube.com/@cybermaterial&quot;,&quot;text&quot;:&quot;Subscribe Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.youtube.com/@cybermaterial"><span>Subscribe Now</span></a></p><div><hr></div><h2><strong>&#128680;INCIDENTS &amp; REAL-WORLD IMPACT</strong></h2><div><hr></div><p><strong>Grafana Labs GitHub breach - code downloaded</strong></p><p>A threat actor breached Grafana Labs&#8217; GitHub environment and downloaded the company&#8217;s source code, the observability platform provider disclosed Sunday. Grafana Labs develops widely used open-source tools for data visualization, log aggregation, and distributed tracing that are deployed across enterprise engineering and DevOps teams globally. The company has not yet disclosed the full scope of the breach or whether customer data was compromised. <a href="https://www.cybermaterial.com/p/grafana-labs-github-breach-code-downloaded">Read More</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MGQE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><h2><strong>&#128275; EXECUTIVE RISK &amp; CYBERNOMICS</strong></h2><div><hr></div><p><strong>Linus Torvalds: AI Bug Reports Overwhelm Linux Security List</strong></p><p>Linus Torvalds announced that AI-generated bug reports have made the Linux kernel security mailing list nearly unmanageable, with maintainers overwhelmed by duplicate reports of the same flaws found by multiple researchers using identical automated tools. The Linux project has updated its security documentation to clarify that AI-discovered bugs should be treated as public issues rather than confidential zero-days, since they surface simultaneously across multiple researchers. Contributors are now required to reproduce issues, provide tested patches, and add genuine analysis beyond raw AI output before submitting reports. <a href="https://www.cybermaterial.com/p/linus-torvalds-ai-bug-reports-overwhelm">Read More</a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f7lS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" width="1456" height="349" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:349,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69329,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195026538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/services/&quot;,&quot;text&quot;:&quot;Get Help&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/services/"><span>Get Help</span></a></p><div><hr></div><h2><strong>&#128737;&#65039; POLICY, REGULATION &amp; LEGAL SIGNALS</strong></h2><div><hr></div><p><strong>NCSC Releases Agentic AI Security Guidance</strong></p><p>The UK&#8217;s National Cyber Security Centre (NCSC) has published new guidance on securing agentic AI systems, warning that their autonomy and complexity create significant cyber risks including unpredictable behavior and excessively broad system access. The guidance, developed with Five Eyes intelligence partners, emphasizes that poorly designed or over-privileged agents can rapidly escalate single failures into serious incidents. Organizations should deploy incrementally with tightly bound pilots, apply least privilege access controls, maintain human oversight, and establish clear ownership and incident response procedures before deployment. <a href="https://www.cybermaterial.com/p/ncsc-releases-agentic-ai-security">Read More</a></p><div><hr></div><h2><strong>&#128187; CAREER ENABLEMENT</strong></h2><div><hr></div><p><strong>Pwn2Own Berlin 2026: 47 zero-days, $1.3M rewards</strong></p><p>Security researchers discovered 47 zero-day vulnerabilities during the Pwn2Own Berlin 2026 hacking competition, earning $1,298,250 in total rewards. The contest focused on finding previously unknown security flaws in various software and hardware products. Vendors will receive detailed vulnerability reports to develop patches before public disclosure. <a href="https://www.cybermaterial.com/p/pwn2own-berlin-2026-47-zero-days">Read More</a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HL0l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><a href="https://www.cybermaterial.com/s/documents">Click Here To Read</a></p><div><hr></div><p>Copyright &#169; 2026 <a href="http://cybermaterial.com/">CyberMaterial</a>. All Rights Reserved.</p><p style="text-align: justify;">Follow CyberMaterial on:</p><p style="text-align: justify;"><a href="https://www.cybermaterial.com/">Substack</a>,<a href="https://www.linkedin.com/company/cybermaterial/"> LinkedIn</a>,<a href="https://twitter.com/cybermaterial_"> Twitter</a>,<a href="https://www.reddit.com/r/cybermaterial/"> Reddit</a>,<a href="https://instagram.com/Cybermat3rial"> Instagram</a>,<a href="https://www.facebook.com/cybermaterial"> Facebook</a>,<a href="https://www.youtube.com/@cybermaterial"> YouTube</a>, and<a href="https://cybermaterial.medium.com/"> Medium</a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Cyber Briefing: 2026.05.15]]></title><description><![CDATA[Organizations are facing a complex risk environment involving "living-off-the-land" software abuse, supply chain credential theft, and significant legal scrutiny regarding the privacy of AI-driven da]]></description><link>https://www.cybermaterial.com/p/cyber-briefing-20260515</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cyber-briefing-20260515</guid><dc:creator><![CDATA[CyberMaterial]]></dc:creator><pubDate>Fri, 15 May 2026 14:02:10 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!2heN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bff3d4c-56d8-4209-9cda-35ad4369d6c5_700x394.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2heN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bff3d4c-56d8-4209-9cda-35ad4369d6c5_700x394.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2heN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bff3d4c-56d8-4209-9cda-35ad4369d6c5_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!2heN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bff3d4c-56d8-4209-9cda-35ad4369d6c5_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!2heN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bff3d4c-56d8-4209-9cda-35ad4369d6c5_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!2heN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bff3d4c-56d8-4209-9cda-35ad4369d6c5_700x394.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2heN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bff3d4c-56d8-4209-9cda-35ad4369d6c5_700x394.png" width="700" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2bff3d4c-56d8-4209-9cda-35ad4369d6c5_700x394.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:239191,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/197851269?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bff3d4c-56d8-4209-9cda-35ad4369d6c5_700x394.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2heN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bff3d4c-56d8-4209-9cda-35ad4369d6c5_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!2heN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bff3d4c-56d8-4209-9cda-35ad4369d6c5_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!2heN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bff3d4c-56d8-4209-9cda-35ad4369d6c5_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!2heN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bff3d4c-56d8-4209-9cda-35ad4369d6c5_700x394.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Welcome to Cyber Briefing, your daily source for all things cybersecurity. We bring you the latest advisories, alerts, incidents, and news every weekday.</p><p style="text-align: justify;">Current threats are characterized by a blend of technical ingenuity and the exploitation of legitimate enterprise software. Threat actors are now bypassing traditional security controls by abusing trusted tools like the HPE Operations Agent to infiltrate networks and utilizing ringless voicemail campaigns to confirm active targets via caller ID spoofing. Meanwhile, the software supply chain remains a critical weakness, as evidenced by a compromise in the TanStack JavaScript library that led to the theft of credential materials from OpenAI repositories.</p><p style="text-align: justify;">On the regulatory and strategic front, global entities are pivoting toward advanced AI and future-proof legislation. Japan&#8217;s financial sector has begun deploying Claude AI for proactive vulnerability testing, while the UK is codifying post-quantum cryptographic standards through the King&#8217;s Speech. However, privacy remains a contentious battleground; OpenAI is currently facing a class-action lawsuit for allegedly sharing sensitive ChatGPT user data with advertising giants like Meta and Google via tracking pixels.</p><p>Listen to our podcast here &#9196;</p><p></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zkJR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" width="1456" height="223" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:223,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://amzn.to/3Kw14fw&quot;,&quot;text&quot;:&quot;Get BlueSleuth-Lite&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://amzn.to/3Kw14fw"><span>Get BlueSleuth-Lite</span></a></p><div><hr></div><h2>&#9889;THREAT LANDSCAPE</h2><div><hr></div><p><strong>Silent Voicemail Scam: Ringless Spam Campaign</strong></p><p>A ringless voicemail scam is targeting phone users by depositing spam voicemails without triggering an incoming call, exploiting caller ID spoofing and automated robocall systems to confirm active numbers. Victims receive repeated voicemail notifications from spoofed or rotating numbers, and calling back can connect them to premium-rate lines, phishing attempts, or further confirm their number is active for future scam campaigns. Users should avoid returning calls to unknown numbers, enable built-in spam filtering on their devices, consider third-party call-blocking apps, and report incidents to the FTC at <a href="http://reportfraud.ftc.gov">reportfraud.ftc.gov</a>. <a href="https://www.cybermaterial.com/p/silent-voicemail-scam-ringless-spam">Read More</a></p><p><strong>Microsoft Warns HPE Operations Agent Abused</strong></p><p>Microsoft has disclosed an intrusion campaign where attackers abused HPE Operations Agent, a legitimate enterprise monitoring tool, to infiltrate networks without using malware or exploiting vulnerabilities. The attackers leveraged the software&#8217;s trusted status and existing deployment to evade detection, representing a shift toward living-off-the-land techniques that bypass traditional security controls. Organizations using HPE Operations Agent should review access logs, monitor for unusual agent behavior, and implement application control policies to restrict unauthorized use of administrative tools.<a href="https://www.cybermaterial.com/p/microsoft-warns-hpe-operations-agent"> Read More</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!llmP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.youtube.com/@cybermaterial&quot;,&quot;text&quot;:&quot;Subscribe Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.youtube.com/@cybermaterial"><span>Subscribe Now</span></a></p><div><hr></div><h2><strong>&#128680;INCIDENTS &amp; REAL-WORLD IMPACT</strong></h2><div><hr></div><p><strong>  OpenAI Compromised in TanStack Supply Chain Attack</strong></p><p>OpenAI confirmed that two employee devices were compromised in a supply chain attack targeting TanStack, a popular JavaScript library ecosystem. Attackers stole credential material from OpenAI code repositories during the breach. Organizations using TanStack should review their dependencies and rotate credentials as a precaution. <a href="https://www.cybermaterial.com/p/openai-compromised-in-tanstack-supply">Read More</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MGQE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><h2><strong>&#128275; EXECUTIVE RISK &amp; CYBERNOMICS</strong></h2><div><hr></div><p><strong>Japan&#8217;s Banks Use Claude for Cybersecurity Testing</strong></p><p>Japan&#8217;s major banks and financial regulators are deploying Anthropic&#8217;s Claude AI system to conduct cybersecurity testing and identify vulnerabilities in their financial infrastructure. This initiative follows warnings that advanced AI could expose weaknesses in financial systems. The program represents a proactive approach by Japanese financial institutions to use AI defensively before threat actors can exploit similar technology for attacks. <a href="https://www.cybermaterial.com/p/japans-banks-use-claude-for-cybersecurity">Read More</a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f7lS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" width="1456" height="349" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:349,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69329,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195026538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/services/&quot;,&quot;text&quot;:&quot;Get Help&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/services/"><span>Get Help</span></a></p><div><hr></div><h2><strong>&#128737;&#65039; POLICY, REGULATION &amp; LEGAL SIGNALS</strong></h2><div><hr></div><p><strong>UK King&#8217;s Speech Emphasizes Cyber Resilience</strong></p><p>The UK King&#8217;s Speech outlined new cybersecurity legislation focusing on post-quantum cryptographic readiness and regulatory reform. The proposed Regulating for Growth Bill aims to reduce regulatory burdens while establishing clear cryptographic standards and compliance timelines for quantum-resistant encryption. The speech also addressed AI innovation through regulatory sandboxes and expanded digital access to NHS patient records. <strong><a href="https://www.cybermaterial.com/p/uk-kings-speech-emphasizes-cyber">Read More</a></strong></p><p><strong>OpenAI faces class-action privacy lawsuit over data sharing</strong></p><p>OpenAI faces a federal class-action lawsuit alleging it embedded Meta&#8217;s Facebook Pixel and Google Analytics tracking code into ChatGPT&#8217;s web interface, secretly sharing users&#8217; sensitive chat content, identifiers, and contact information with advertising platforms without consent. The complaint, filed in California, claims these practices violate the Electronic Communications Privacy Act and California privacy laws by intercepting confidential conversations about health, finances, and legal matters. Security teams should immediately audit AI tools for third-party tracking pixels and review data-sharing agreements to prevent similar exposure. <a href="https://www.cybermaterial.com/p/openai-faces-class-action-privacy">Read More</a></p><div><hr></div><h2><strong>&#128187; CAREER ENABLEMENT</strong></h2><div><hr></div><p><strong>Scott Lashway Named to Cybersecurity Docket&#8217;s 2026 Elite List</strong></p><p>Scott Lashway, co-chair of Mintz&#8217;s Privacy &amp; Cybersecurity Practice, has been named to Cybersecurity Docket&#8217;s 2026 Incident Response Elite list, recognizing top lawyers who advise organizations during major data breaches and cyber incidents. Lashway specializes in cybersecurity, privacy, and technology disputes across regulated industries including healthcare, financial services, and technology. He provides counsel on incident response, breach investigations, litigation, government investigations, data governance, and compliance with privacy and cybersecurity laws. <a href="https://www.cybermaterial.com/p/scott-lashway-named-to-cybersecurity">Read More</a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HL0l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><a href="https://www.cybermaterial.com/s/documents">Click Here To Read</a></p><div><hr></div><p>Copyright &#169; 2026 <a href="http://cybermaterial.com/">CyberMaterial</a>. All Rights Reserved.</p><p style="text-align: justify;">Follow CyberMaterial on:</p><p style="text-align: justify;"><a href="https://www.cybermaterial.com/">Substack</a>,<a href="https://www.linkedin.com/company/cybermaterial/"> LinkedIn</a>,<a href="https://twitter.com/cybermaterial_"> Twitter</a>,<a href="https://www.reddit.com/r/cybermaterial/"> Reddit</a>,<a href="https://instagram.com/Cybermat3rial"> Instagram</a>,<a href="https://www.facebook.com/cybermaterial"> Facebook</a>,<a href="https://www.youtube.com/@cybermaterial"> YouTube</a>, and<a href="https://cybermaterial.medium.com/"> Medium</a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Cyber Briefing: 2026.05.14]]></title><description><![CDATA[Attackers are leveraging legacy proxy tools for persistent access in a landscape where critical infrastructure and healthcare remain highly vulnerable to third-party supply chain failures and evolving]]></description><link>https://www.cybermaterial.com/p/cyber-briefing-20260514</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cyber-briefing-20260514</guid><dc:creator><![CDATA[CyberMaterial]]></dc:creator><pubDate>Thu, 14 May 2026 12:29:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!rS3n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56c56f58-9165-4850-a62d-587708b3a708_700x394.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rS3n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56c56f58-9165-4850-a62d-587708b3a708_700x394.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rS3n!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56c56f58-9165-4850-a62d-587708b3a708_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!rS3n!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56c56f58-9165-4850-a62d-587708b3a708_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!rS3n!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56c56f58-9165-4850-a62d-587708b3a708_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!rS3n!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56c56f58-9165-4850-a62d-587708b3a708_700x394.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rS3n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56c56f58-9165-4850-a62d-587708b3a708_700x394.png" width="700" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/56c56f58-9165-4850-a62d-587708b3a708_700x394.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:366666,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/197680601?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56c56f58-9165-4850-a62d-587708b3a708_700x394.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rS3n!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56c56f58-9165-4850-a62d-587708b3a708_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!rS3n!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56c56f58-9165-4850-a62d-587708b3a708_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!rS3n!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56c56f58-9165-4850-a62d-587708b3a708_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!rS3n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56c56f58-9165-4850-a62d-587708b3a708_700x394.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Welcome to Cyber Briefing, your daily source for all things cybersecurity. We bring you the latest advisories, alerts, incidents, and news every weekday.</p><p style="text-align: justify;">Current cyber activity highlights a shift toward sophisticated persistence and increased targeting of critical infrastructure. The <strong>ClickFix campaign</strong> has advanced its tactics by integrating <strong>PySoxy</strong>, an old Python-based SOCKS5 proxy, to maintain stealthy network access rather than relying on one-off commands. Simultaneously, the <strong>Canadian telecommunications sector</strong> is grappling with a rise in nation-state intrusions and ransomware, while the healthcare industry faces ongoing fallout from third-party vulnerabilities, specifically through major breaches at <strong>Atrium Health</strong> and <strong>Interim HealthCare</strong> involving legacy systems and vendor portals.</p><p style="text-align: justify;">On the strategic and economic front, global agencies and tech leaders are pivoting heavily toward <strong>AI integration and supply chain transparency</strong>. CISA and G7 partners have introduced new guidance for <strong>AI Software Bills of Materials (SBOMs)</strong> to help organizations track data and model dependencies. This shift is mirrored in the private sector and national economies: the <strong>UK&#8217;s cybersecurity market</strong> has surged to &#163;14.7 billion with a massive focus on AI firms, while <strong>Cisco</strong> is restructuring its workforce, cutting 4,000 positions, to aggressively reallocate resources into AI infrastructure and security development.</p><p>Listen to our podcast here &#9196;</p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8a426b057dd2e0c473f0f32288&quot;,&quot;title&quot;:&quot;May 14, 2026 - Cyber Briefing&quot;,&quot;subtitle&quot;:&quot;CyberMaterial&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/45Iyj00Ws5hFFkYeB9vDjI&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/45Iyj00Ws5hFFkYeB9vDjI" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zkJR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" width="1456" height="223" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:223,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://amzn.to/3Kw14fw&quot;,&quot;text&quot;:&quot;Get BlueSleuth-Lite&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://amzn.to/3Kw14fw"><span>Get BlueSleuth-Lite</span></a></p><div><hr></div><h2>&#9889;THREAT LANDSCAPE</h2><div><hr></div><p><strong>ClickFix Campaign Evolves with PySoxy SOCKS5 Proxy</strong></p><p>A new ClickFix campaign is using PySoxy, a 10-year-old open-source Python SOCKS5 proxy tool, to establish persistent network access after initial infection. The attack moves beyond typical ClickFix tactics that rely on single PowerShell command execution, instead building a layered intrusion chain that allows attackers to maintain stealthy access to compromised systems. Organizations should monitor for unusual SOCKS5 proxy activity and PowerShell executions that establish persistent connections.<strong> <a href="https://www.cybermaterial.com/p/clickfix-campaign-evolves-with-pysoxy">Read More</a></strong></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!llmP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.youtube.com/@cybermaterial&quot;,&quot;text&quot;:&quot;Subscribe Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.youtube.com/@cybermaterial"><span>Subscribe Now</span></a></p><div><hr></div><h2><strong>&#128680;INCIDENTS &amp; REAL-WORLD IMPACT</strong></h2><div><hr></div><p><strong> Canadian Telecom Providers Face Cyber Threats</strong></p><p>Canadian telecommunications providers are experiencing increased cyber threats including ransomware attacks, SIM swapping fraud, data breaches, and nation-state intrusions targeting critical infrastructure. These attacks threaten both customer data security and the operational integrity of essential communication networks. Telecom operators should implement enhanced security monitoring, multi-factor authentication, and incident response capabilities to defend against these evolving threats. <a href="https://www.cybermaterial.com/p/canadian-telecom-providers-face-cyber">Read More</a></p><p><strong>Atrium Health, Interim HealthCare Hit by Vendor Breaches</strong></p><p>Atrium Health Navicent and Interim HealthCare facilities in Texas disclosed patient data breaches stemming from third-party vendor compromises. Atrium Health was affected by the January 2025 Oracle Health breach involving legacy Cerner servers, exposing medical records and Social Security numbers for patients treated before mid-2022. Interim HealthCare locations in Lubbock and Amarillo were impacted by unauthorized access to Doctor Alliance&#8217;s web portal between October and November 2025, affecting 2,737 patients total. <a href="https://www.cybermaterial.com/p/atrium-health-interim-healthcare">Read More</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MGQE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><h2><strong>&#128275; EXECUTIVE RISK &amp; CYBERNOMICS</strong></h2><div><hr></div><p><strong>CISA releases AI SBOM guidance for supply-chain oversight</strong></p><p>CISA and G7 cyber agencies released guidance on minimum elements for AI software bills of materials (SBOMs), extending traditional software supply-chain documentation to include AI models, datasets, training data, and infrastructure dependencies. The guidance is voluntary and aims to help security teams assess AI systems during procurement and vendor risk management, though experts note it provides visibility into what vendors disclose rather than assurance of actual system behavior. Security leaders should use AI SBOMs to question vendors about model provenance, data sources, dependencies, and security controls before allowing AI products into production environments.<a href="https://www.cybermaterial.com/p/cisa-releases-ai-sbom-guidance-for"> Read More</a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f7lS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" width="1456" height="349" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:349,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69329,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195026538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/services/&quot;,&quot;text&quot;:&quot;Get Help&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/services/"><span>Get Help</span></a></p><div><hr></div><h2><strong>&#128737;&#65039; POLICY, REGULATION &amp; LEGAL SIGNALS</strong></h2><div><hr></div><p>UK Cyber Sector Grows to &#163;14.7bn as Resilience Bill Advances</p><p>The UK cybersecurity sector generated &#163;14.7 billion in revenue last year, employing nearly 70,000 people across 2,603 firms, with AI-focused security companies growing 68% annually. The government launched the Cyber Resilience Pledge, a voluntary initiative urging organizations to adopt security best practices, though experts criticize this approach as insufficient. The Cyber Security and Resilience Bill continues through parliament, aiming to mandate stronger protections for critical infrastructure providers through incident reporting requirements and managed service provider accountability. <strong><a href="https://www.cybermaterial.com/p/uk-cyber-sector-grows-to-147bn-as">Read More</a></strong></p><div><hr></div><h2><strong>&#128187; CAREER ENABLEMENT</strong></h2><div><hr></div><p><strong>Cisco cuts 4,000 jobs, prioritizes AI and security</strong></p><p>Cisco announced plans to cut up to 4,000 jobs (approximately 5% of its workforce) starting May 14, 2026, as part of a strategic shift toward AI and security investments amid intensifying competition and component shortages. Despite the layoffs, the company reported strong Q3 FY26 results with revenue of $15.8 billion (up 12% year-over-year) and raised its AI infrastructure revenue forecast from $3 billion to $4 billion for the fiscal year. Affected employees will receive pro-rated bonuses, placement services with a 75% success rate, and one year of free access to Cisco training courses in AI, security, and networking. <strong><a href="https://www.cybermaterial.com/p/cisco-cuts-4000-jobs-prioritizes">Read More</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HL0l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><a href="https://www.cybermaterial.com/s/documents">Click Here To Read</a></p><div><hr></div><p>Copyright &#169; 2026 <a href="http://cybermaterial.com/">CyberMaterial</a>. All Rights Reserved.</p><p style="text-align: justify;">Follow CyberMaterial on:</p><p style="text-align: justify;"><a href="https://www.cybermaterial.com/">Substack</a>,<a href="https://www.linkedin.com/company/cybermaterial/"> LinkedIn</a>,<a href="https://twitter.com/cybermaterial_"> Twitter</a>,<a href="https://www.reddit.com/r/cybermaterial/"> Reddit</a>,<a href="https://instagram.com/Cybermat3rial"> Instagram</a>,<a href="https://www.facebook.com/cybermaterial"> Facebook</a>,<a href="https://www.youtube.com/@cybermaterial"> YouTube</a>, and<a href="https://cybermaterial.medium.com/"> Medium</a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Cyber Briefing: 2026.05.13]]></title><description><![CDATA[Organizations are facing a "pincer maneuver" of external technical exploits, such as weaponized Git hooks and AI extension flaws, and internal integrity failures where employees sell high-level access]]></description><link>https://www.cybermaterial.com/p/cyber-briefing-20260513</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cyber-briefing-20260513</guid><dc:creator><![CDATA[CyberMaterial]]></dc:creator><pubDate>Wed, 13 May 2026 14:01:49 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!fMAh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98cc9ebd-f3b5-4794-8d53-28b1a52e0c0c_700x394.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fMAh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98cc9ebd-f3b5-4794-8d53-28b1a52e0c0c_700x394.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fMAh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98cc9ebd-f3b5-4794-8d53-28b1a52e0c0c_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!fMAh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98cc9ebd-f3b5-4794-8d53-28b1a52e0c0c_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!fMAh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98cc9ebd-f3b5-4794-8d53-28b1a52e0c0c_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!fMAh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98cc9ebd-f3b5-4794-8d53-28b1a52e0c0c_700x394.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fMAh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98cc9ebd-f3b5-4794-8d53-28b1a52e0c0c_700x394.png" width="700" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/98cc9ebd-f3b5-4794-8d53-28b1a52e0c0c_700x394.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:72461,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/197500805?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98cc9ebd-f3b5-4794-8d53-28b1a52e0c0c_700x394.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fMAh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98cc9ebd-f3b5-4794-8d53-28b1a52e0c0c_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!fMAh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98cc9ebd-f3b5-4794-8d53-28b1a52e0c0c_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!fMAh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98cc9ebd-f3b5-4794-8d53-28b1a52e0c0c_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!fMAh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98cc9ebd-f3b5-4794-8d53-28b1a52e0c0c_700x394.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Welcome to Cyber Briefing, your daily source for all things cybersecurity. We bring you the latest advisories, alerts, incidents, and news every weekday.</p><p style="text-align: justify;">Sophisticated social engineering and systemic internal vulnerabilities have been discovered this week. North Korean actors are now weaponizing developer workflows by hiding malware within <strong>Git hooks</strong> during fake recruitment cycles, while the <strong>ClaudeBleed</strong> vulnerability exposes a critical design flaw in AI browser extensions that allows data theft from integrated Google and GitHub accounts. These external threats are compounded by a startling rise in &#8220;insider commerce,&#8221; with <strong>1 in 8 employees</strong>, particularly senior executives, admitting to the sale of corporate credentials, creating a high-risk environment where access is traded as a commodity.</p><p style="text-align: justify;">Real-world impacts and regulatory consequences continue to mount as organizations struggle with detection and legacy infrastructure. <strong>FleetWave</strong> recently joined the list of breached SaaS providers, losing operational and payroll data, while <strong>South Staffordshire Water</strong> incurred a <strong>&#163;1 million fine</strong> for a multi-year intrusion that went undetected due to inadequate monitoring and the use of outdated systems. Despite these challenges, the <strong>2026 CSO Award</strong> winners demonstrate a path forward through innovation, showcasing how zero-trust architectures and AI-driven automation can reclaim thousands of manual work hours and significantly bolster phishing defense rates.</p><p>Listen to our podcast here &#9196;</p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8a426b057dd2e0c473f0f32288&quot;,&quot;title&quot;:&quot;May 13, 2026 - Cyber Briefing&quot;,&quot;subtitle&quot;:&quot;CyberMaterial&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/6Kl17AgKVEmWXEgPXNR1Ff&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/6Kl17AgKVEmWXEgPXNR1Ff" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zkJR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" width="1456" height="223" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:223,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://amzn.to/3Kw14fw&quot;,&quot;text&quot;:&quot;Get BlueSleuth-Lite&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://amzn.to/3Kw14fw"><span>Get BlueSleuth-Lite</span></a></p><div><hr></div><h2>&#9889;THREAT LANDSCAPE</h2><div><hr></div><p><strong>North Korea Abuses Git Hooks for Malware</strong></p><p>North Korean threat actors have updated their &#8220;Contagious Interview&#8221; campaign by abusing Git hooks to deliver malware to software developers. The attackers pose as recruiters and trick victims into cloning malicious GitHub repositories that contain fake coding assessments, which then execute hidden malware through Git&#8217;s hook mechanism. Developers should carefully verify job opportunities, inspect repositories before cloning them, and review Git hook configurations in any downloaded projects. <strong><a href="https://www.cybermaterial.com/p/north-korea-abuses-git-hooks-for">Read More</a></strong></p><p><strong>ClaudeBleed, Critical Claude Chrome Extension Flaw</strong></p><p>A critical vulnerability named ClaudeBleed in Anthropic&#8217;s Claude Chrome extension allows malicious browser add-ons to hijack the AI assistant and steal sensitive data from Gmail, Google Drive, and GitHub. The design flaw enables exploitation even by extensions with no declared permissions, turning the trusted AI tool into a potential backdoor. Users of the Claude Chrome extension should immediately review installed browser extensions and monitor their accounts for unauthorized access until a patch is released. <strong><a href="https://www.cybermaterial.com/p/claudebleed-critical-claude-chrome">Read More</a></strong></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!llmP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.youtube.com/@cybermaterial&quot;,&quot;text&quot;:&quot;Subscribe Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.youtube.com/@cybermaterial"><span>Subscribe Now</span></a></p><div><hr></div><h2><strong>&#128680;INCIDENTS &amp; REAL-WORLD IMPACT</strong></h2><div><hr></div><p> <strong>FleetWave breach exposes customer data</strong></p><p>FleetWave, a SaaS provider for fleet management, notified customers that attackers accessed operational data, contact details, and payroll numbers during a security breach. The company took a month to restore systems after the incident before informing affected parties. Customers should monitor for phishing attempts and unauthorized access using compromised credentials. <a href="https://www.cybermaterial.com/p/fleetwave-breach-exposes-customer">Read More</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MGQE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><h2><strong>&#128275; EXECUTIVE RISK &amp; CYBERNOMICS</strong></h2><div><hr></div><p><strong>1 in 8 employees sold or know of sold login credentials</strong></p><p>A UK survey of 2,000 employees at large companies found that one in eight workers have sold their corporate login credentials or know someone who did in the past year, with senior executives showing the highest willingness to sell access. Higher-level employees pose greater risk because their accounts typically have broader system privileges, even under least-privilege access policies. Organizations should implement stricter access controls, monitor for credential leaks (KELA tracked 2.9 billion compromised credentials globally in 2025), and educate staff that selling credentials enables account takeovers and data theft affecting both the company and its customers. <a href="https://www.cybermaterial.com/p/1-in-8-employees-sold-or-know-of">Read More</a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f7lS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" width="1456" height="349" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:349,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69329,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195026538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/services/&quot;,&quot;text&quot;:&quot;Get Help&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/services/"><span>Get Help</span></a></p><div><hr></div><h2><strong>&#128737;&#65039; POLICY, REGULATION &amp; LEGAL SIGNALS</strong></h2><div><hr></div><p><strong>South Staffordshire Water Fined &#163;1m After Data Breach</strong></p><p>South Staffordshire Water has been fined &#163;1 million by the UK&#8217;s Information Commissioner&#8217;s Office after a two-year network intrusion compromised personal data of over 633,000 customers and employees. The breach began with a September 2020 phishing attack that installed malware, but went undetected until July 2022 when performance issues triggered an investigation; stolen data including bank details and disability information was later dumped on the dark web. The ICO found multiple security failures including inadequate monitoring (only 5% of the IT environment covered), use of legacy Windows Server 2003 systems, lack of least privilege controls, and poor vulnerability management.<a href="https://www.cybermaterial.com/p/south-staffordshire-water-fined-1m"> Read More</a></p><div><hr></div><h2><strong>&#128187; CAREER ENABLEMENT</strong></h2><div><hr></div><p><strong>CISOs Step Into AI Spotlight</strong></p><p>Chief Information Security Officers (CISOs) are taking on expanded strategic roles as they manage AI adoption across enterprises, with 95% now engaging with boards multiple times monthly and 31% reporting directly to boards rather than CIOs. Security leaders are implementing AI governance frameworks to enable rapid business innovation while managing risks from AI-powered attacks, including sophisticated phishing campaigns and automated vulnerability exploitation. CISOs emphasize embedding security early in AI development, maintaining strong data governance and identity management, and positioning security as a business enabler rather than an obstacle. <strong><a href="https://www.cybermaterial.com/p/cisos-step-into-ai-spotlight">Read More</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HL0l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><a href="https://www.cybermaterial.com/s/documents">Click Here To Read</a></p><div><hr></div><p>Copyright &#169; 2026 <a href="http://cybermaterial.com/">CyberMaterial</a>. All Rights Reserved.</p><p style="text-align: justify;">Follow CyberMaterial on:</p><p style="text-align: justify;"><a href="https://www.cybermaterial.com/">Substack</a>,<a href="https://www.linkedin.com/company/cybermaterial/"> LinkedIn</a>,<a href="https://twitter.com/cybermaterial_"> Twitter</a>,<a href="https://www.reddit.com/r/cybermaterial/"> Reddit</a>,<a href="https://instagram.com/Cybermat3rial"> Instagram</a>,<a href="https://www.facebook.com/cybermaterial"> Facebook</a>,<a href="https://www.youtube.com/@cybermaterial"> YouTube</a>, and<a href="https://cybermaterial.medium.com/"> Medium</a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Cyber Briefing: 2026.05.12]]></title><description><![CDATA[The "Mini Shai-Hulud" supply chain attack and critical SAP vulnerabilities represent high-impact systemic risks, while the record GM settlement and the formation of the ACI signal a shift toward...]]></description><link>https://www.cybermaterial.com/p/cyber-briefing-20260512</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cyber-briefing-20260512</guid><dc:creator><![CDATA[CyberMaterial]]></dc:creator><pubDate>Tue, 12 May 2026 14:02:10 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!rcBj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f795143-8143-4390-98ba-82e0052d580f_700x394.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rcBj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f795143-8143-4390-98ba-82e0052d580f_700x394.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rcBj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f795143-8143-4390-98ba-82e0052d580f_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!rcBj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f795143-8143-4390-98ba-82e0052d580f_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!rcBj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f795143-8143-4390-98ba-82e0052d580f_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!rcBj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f795143-8143-4390-98ba-82e0052d580f_700x394.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rcBj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f795143-8143-4390-98ba-82e0052d580f_700x394.png" width="700" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3f795143-8143-4390-98ba-82e0052d580f_700x394.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:297528,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/197341840?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f795143-8143-4390-98ba-82e0052d580f_700x394.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rcBj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f795143-8143-4390-98ba-82e0052d580f_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!rcBj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f795143-8143-4390-98ba-82e0052d580f_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!rcBj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f795143-8143-4390-98ba-82e0052d580f_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!rcBj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f795143-8143-4390-98ba-82e0052d580f_700x394.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Welcome to Cyber Briefing, your daily source for all things cybersecurity. We bring you the latest advisories, alerts, incidents, and news every weekday.</p><p style="text-align: justify;">The cybersecurity landscape is currently facing a dual threat from sophisticated supply chain attacks and critical software vulnerabilities. The &#8220;Mini Shai-Hulud&#8221; campaign successfully compromised over 170 software packages, impacting major entities like Mistral AI and TanStack by infiltrating downstream dependencies. Concurrently, SAP has issued urgent patches for critical flaws in its Commerce Cloud and S/4HANA platforms, while &#352;koda Auto confirmed a data breach involving customer information due to a exploited web shop vulnerability. These events underscore a persistent trend where attackers target the foundational software and third-party tools that modern enterprises rely on for core operations.</p><p style="text-align: justify;">In response to shifting federal support and emerging technologies, the private sector and regulators are taking more assertive stances on security and privacy. Major U.S. firms have formed the Alliance for Critical Infrastructure (ACI) to bridge gaps left by federal cutbacks, while California&#8217;s $12.75 million settlement with General Motors sets a new precedent for enforcing data privacy under the CCPA. Amidst these changes, the role of the CISO is evolving into a strategic board-level position, focused on governing AI adoption and securing cross-platform communication, such as the new end-to-end encryption standards implemented between Apple and Google devices.</p><p>Listen to our podcast here &#9196;</p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8a426b057dd2e0c473f0f32288&quot;,&quot;title&quot;:&quot;May 12, 2026 - Cyber Briefing&quot;,&quot;subtitle&quot;:&quot;CyberMaterial&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/3lvBVO9g82C3S98Gv3ayVL&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/3lvBVO9g82C3S98Gv3ayVL" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zkJR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" width="1456" height="223" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:223,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://amzn.to/3Kw14fw&quot;,&quot;text&quot;:&quot;Get BlueSleuth-Lite&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://amzn.to/3Kw14fw"><span>Get BlueSleuth-Lite</span></a></p><div><hr></div><h2>&#9889;THREAT LANDSCAPE</h2><div><hr></div><p><strong>Mini Shai-Hulud Supply Chain Attack</strong></p><p>A supply chain attack called Mini Shai-Hulud compromised over 400 malicious versions of 170 software packages, targeting prominent organizations including TanStack, Mistral AI, and UiPath. The campaign represents a significant threat to software supply chains by distributing compromised packages that could affect downstream users and systems. Organizations using these packages should immediately audit their dependencies and verify package integrity.<strong> <a href="https://www.cybermaterial.com/p/mini-shai-hulud-supply-chain-attack">Read More</a></strong></p><p><strong>SAP fixes critical vulnerabilities in Commerce Cloud, S/4HAN</strong></p><p>SAP released May 2026 security updates fixing 15 vulnerabilities, including two critical flaws in Commerce Cloud and S/4HANA ERP systems. The critical vulnerabilities could allow attackers to compromise enterprise e-commerce platforms and core business systems. Organizations using these SAP products should apply the security patches immediately to prevent potential exploitation. <strong><a href="https://www.cybermaterial.com/p/sap-fixes-critical-vulnerabilities">Read More</a></strong></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!llmP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.youtube.com/@cybermaterial&quot;,&quot;text&quot;:&quot;Subscribe Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.youtube.com/@cybermaterial"><span>Subscribe Now</span></a></p><div><hr></div><h2><strong>&#128680;INCIDENTS &amp; REAL-WORLD IMPACT</strong></h2><div><hr></div><p> <strong>&#352;koda online shop breach via vulnerability</strong></p><p>&#352;koda Auto discovered attackers exploited a vulnerability in its online shop software to gain temporary unauthorized access to customer data. The company took the shop offline, patched the vulnerability, engaged IT forensics specialists, and notified data protection authorities. Technical analysis confirmed that stored customer data was accessed during the breach. <strong><a href="https://www.cybermaterial.com/p/sap-fixes-critical-vulnerabilities">Read More</a></strong></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MGQE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><h2><strong>&#128275; EXECUTIVE RISK &amp; CYBERNOMICS</strong></h2><div><hr></div><p><strong>Critical Infrastructure Coalition Launches</strong></p><p>Major U.S. critical infrastructure operators including JPMorgan Chase, Mastercard, AT&amp;T, and Berkshire Hathaway Energy have formed the Alliance for Critical Infrastructure (ACI) to coordinate cybersecurity efforts across sectors as federal support diminishes. The initiative responds to Trump administration cutbacks at CISA, elimination of the Critical Infrastructure Partnership Advisory Council, and reduced government capacity to support infrastructure protection. The ACI will focus on analyzing cross-sector dependencies, developing polycrisis response protocols, expanding information sharing, and advising policymakers while working alongside existing sector groups and remaining federal agencies. <strong><a href="https://www.cybermaterial.com/p/critical-infrastructure-coalition">Read More</a></strong></p><p><strong>Apple, Google enable E2EE RCS messaging</strong></p><p>Apple and Google have launched beta support for end-to-end encrypted Rich Communication Services (RCS) messaging between iPhone and Android devices, ending years of cross-platform messages traveling in plaintext. The feature requires iOS 26.5 and the latest Google Messages app, with availability varying by carrier and region. Users will see a lock icon in RCS conversations when encryption is active, bringing cross-platform texting security closer to apps like WhatsApp and Signal. <strong><a href="https://www.cybermaterial.com/p/apple-google-enable-e2ee-rcs-messaging">Read More</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f7lS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" width="1456" height="349" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:349,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69329,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195026538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/services/&quot;,&quot;text&quot;:&quot;Get Help&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/services/"><span>Get Help</span></a></p><div><hr></div><h2><strong>&#128737;&#65039; POLICY, REGULATION &amp; LEGAL SIGNALS</strong></h2><div><hr></div><p><strong>California Settles $12.75M CCPA Case Against GM</strong></p><p>California Attorney General Rob Bonta announced a $12.75 million settlement with General Motors for illegally collecting and selling driver data without proper consent, marking the largest California Consumer Privacy Act (CCPA) penalty to date. GM allegedly shared geolocation and driving behavior data from its OnStar platform with data brokers Verisk Analytics and LexisNexis Risk Solutions between 2020 and 2024, violating data minimization requirements. Under the settlement, GM must stop selling driving data to consumer reporting agencies for five years, delete retained data within 180 days, and establish a comprehensive privacy compliance program. <a href="https://www.cybermaterial.com/p/california-settles-1275m-ccpa-case">Read More</a></p><div><hr></div><h2><strong>&#128187; CAREER ENABLEMENT</strong></h2><div><hr></div><p><strong>CISOs Step Into AI Spotlight</strong></p><p>Chief Information Security Officers (CISOs) are taking on expanded strategic roles as they manage AI adoption across enterprises, with 95% now engaging with boards multiple times monthly and 31% reporting directly to boards rather than CIOs. Security leaders are implementing AI governance frameworks to enable rapid business innovation while managing risks from AI-powered attacks, including sophisticated phishing campaigns and automated vulnerability exploitation. CISOs emphasize embedding security early in AI development, maintaining strong data governance and identity management, and positioning security as a business enabler rather than an obstacle. <strong><a href="https://www.cybermaterial.com/p/cisos-step-into-ai-spotlight">Read More</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HL0l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><a href="https://www.cybermaterial.com/s/documents">Click Here To Read</a></p><div><hr></div><p>Copyright &#169; 2026 <a href="http://cybermaterial.com/">CyberMaterial</a>. All Rights Reserved.</p><p style="text-align: justify;">Follow CyberMaterial on:</p><p style="text-align: justify;"><a href="https://www.cybermaterial.com/">Substack</a>,<a href="https://www.linkedin.com/company/cybermaterial/"> LinkedIn</a>,<a href="https://twitter.com/cybermaterial_"> Twitter</a>,<a href="https://www.reddit.com/r/cybermaterial/"> Reddit</a>,<a href="https://instagram.com/Cybermat3rial"> Instagram</a>,<a href="https://www.facebook.com/cybermaterial"> Facebook</a>,<a href="https://www.youtube.com/@cybermaterial"> YouTube</a>, and<a href="https://cybermaterial.medium.com/"> Medium</a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Cyber Briefing: 2026.05.11]]></title><description><![CDATA[Threat actors are increasingly weaponizing trusted ecosystems, to deploy information stealers across Windows and macOS, while ransomware groups like Lynx continue to target public infrastructure ....]]></description><link>https://www.cybermaterial.com/p/cyber-briefing-20260511</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cyber-briefing-20260511</guid><dc:creator><![CDATA[CyberMaterial]]></dc:creator><pubDate>Mon, 11 May 2026 14:02:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!p3Ge!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e77094b-a105-4ad9-aced-5b5695517c10_700x394.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!p3Ge!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e77094b-a105-4ad9-aced-5b5695517c10_700x394.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!p3Ge!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e77094b-a105-4ad9-aced-5b5695517c10_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!p3Ge!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e77094b-a105-4ad9-aced-5b5695517c10_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!p3Ge!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e77094b-a105-4ad9-aced-5b5695517c10_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!p3Ge!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e77094b-a105-4ad9-aced-5b5695517c10_700x394.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!p3Ge!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e77094b-a105-4ad9-aced-5b5695517c10_700x394.png" width="700" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e77094b-a105-4ad9-aced-5b5695517c10_700x394.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:228373,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/197210812?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e77094b-a105-4ad9-aced-5b5695517c10_700x394.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!p3Ge!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e77094b-a105-4ad9-aced-5b5695517c10_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!p3Ge!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e77094b-a105-4ad9-aced-5b5695517c10_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!p3Ge!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e77094b-a105-4ad9-aced-5b5695517c10_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!p3Ge!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e77094b-a105-4ad9-aced-5b5695517c10_700x394.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Welcome to Cyber Briefing, your daily source for all things cybersecurity. We bring you the latest advisories, alerts, incidents, and news every weekday.</p><p style="text-align: justify;">The current threat environment is characterized by sophisticated social engineering and the exploitation of trusted platforms to distribute malware. Malicious actors successfully manipulated Hugging Face metrics to push a Windows infostealer to nearly a quarter-million users, while others utilized &#8220;ClickFix&#8221; tactics via poisoned Google Ads to infect macOS systems with the MacSync stealer. Meanwhile, the ransomware landscape remains aggressive, as evidenced by the Lynx gang&#8217;s disruption of St Anne&#8217;s Catholic School, highlighting a persistent trend where educational institutions face both operational shutdowns and the threat of sensitive data exfiltration.</p><p style="text-align: justify;">In response to these evolving threats, the industry is seeing a massive shift toward AI integration and strengthened international cooperation. A staggering 77% of organizations have now adopted AI for defensive operations like phishing detection and incident response, signaling a pivot in &#8220;cybernomics&#8221; toward automated defense. This systemic shift is mirrored by increased regulatory and legal pressure, including the swift dismantling of the resurrected Crimenetwork dark web marketplace and high-level safety summits between AI leaders like Anthropic and the South Korean government. Additionally, the talent pipeline is being fortified through hands-on initiatives like Arkansas State University&#8217;s new student-run Security Operations Center, blending academic research with real-world threat monitoring.</p><p>Listen to our podcast here &#9196;</p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8a426b057dd2e0c473f0f32288&quot;,&quot;title&quot;:&quot;May 11, 2026 - Cyber Briefing&quot;,&quot;subtitle&quot;:&quot;CyberMaterial&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/0ToNG1K0UlpwwE3kBMmtEw&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/0ToNG1K0UlpwwE3kBMmtEw" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zkJR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" width="1456" height="223" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:223,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://amzn.to/3Kw14fw&quot;,&quot;text&quot;:&quot;Get BlueSleuth-Lite&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://amzn.to/3Kw14fw"><span>Get BlueSleuth-Lite</span></a></p><div><hr></div><h2>&#9889;THREAT LANDSCAPE</h2><div><hr></div><p><strong>Malicious Hugging Face Repo Spreads Windows Infostealer</strong></p><p>A malicious repository named Open-OSS/privacy-filter on the Hugging Face platform distributed a Rust-based information-stealing malware targeting Windows users. The repository reached the number one trending position with approximately 244,000 downloads and hundreds of likes before being removed, with evidence suggesting the threat actor artificially inflated its popularity metrics. Hugging Face has since taken down the repository, but users who downloaded the software should scan their systems for compromise and rotate credentials. <a href="https://www.cybermaterial.com/p/malicious-hugging-face-repo-spreads">Read More</a></p><p><strong>macOS Malware Campaign via Google Ads</strong></p><p>Threat actors are distributing macOS malware through poisoned Google Ads that mimic legitimate AI applications like Claude, redirecting users to fake download pages hosted on trusted platforms including Google Sites and Framer. The campaign uses social engineering tactics called &#8220;ClickFix&#8221; to trick victims into executing malicious terminal commands that install MacSync, an information stealer targeting browser credentials, cryptocurrency wallets, and session tokens. Users should avoid clicking sponsored search ads for software downloads and navigate directly to official vendor websites instead.<a href="https://www.cybermaterial.com/p/macos-malware-campaign-via-google"> Read More</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!llmP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.youtube.com/@cybermaterial&quot;,&quot;text&quot;:&quot;Subscribe Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.youtube.com/@cybermaterial"><span>Subscribe Now</span></a></p><div><hr></div><h2><strong>&#128680;INCIDENTS &amp; REAL-WORLD IMPACT</strong></h2><div><hr></div><p> <strong> Lynx ransomware gang claims St Anne&#8217;s School attack</strong></p><p>The Lynx ransomware gang has claimed responsibility for a March 2026 attack on St Anne&#8217;s Catholic School in Southampton, UK, alleging theft of confidential information, financial data, and contracts. The school was forced to close for four days following the attack, though headteacher Julian Waterfield maintains there is no evidence of data compromise. Lynx, which operates a Ransomware-as-a-Service model and has claimed 389 attacks since July 2024, typically employs a two-stage approach: encrypting systems for ransom and exfiltrating data for additional extortion if payment is not received.<a href="https://www.cybermaterial.com/p/lynx-ransomware-gang-claims-st-annes"> Read More</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MGQE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><h2><strong>&#128275; EXECUTIVE RISK &amp; CYBERNOMICS</strong></h2><div><hr></div><p><strong>WEF: AI adoption in cybersecurity reaches 77%</strong></p><p>A World Economic Forum white paper reports that 77% of organizations now use AI in cybersecurity operations, with 94% of survey respondents identifying AI as the biggest driver of change in the field. Organizations are primarily deploying AI for phishing detection, anomaly monitoring, vulnerability management, and incident response. The WEF suggests AI could shift the advantage toward defenders who face increasing alert volumes. <a href="https://www.cybermaterial.com/p/wef-ai-adoption-in-cybersecurity">Read More</a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f7lS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" width="1456" height="349" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:349,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69329,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195026538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/services/&quot;,&quot;text&quot;:&quot;Get Help&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/services/"><span>Get Help</span></a></p><div><hr></div><h2><strong>&#128737;&#65039; POLICY, REGULATION &amp; LEGAL SIGNALS</strong></h2><div><hr></div><p><strong>Police Shut Down Relaunched Crimenetwork Dark Web Marketplac</strong></p><p>German and Spanish police arrested a 35-year-old German national in Mallorca for relaunching the Crimenetwork dark web marketplace just days after authorities shut down the original site in December 2024. The new platform had already attracted over 22,000 users and 100 vendors, generating more than &#8364;3.6 million in revenue through sales of drugs, stolen data, and forged documents. Police seized &#8364;194,000 in assets and obtained user and transaction data that may lead to additional arrests. <strong><a href="https://www.cybermaterial.com/p/police-shut-down-relaunched-crimenetwork">Read More</a></strong></p><p>Anthropic, South Korea discuss AI safety cooperation</p><p>Anthropic executives met with South Korean government officials to discuss cooperation on AI safety, cybersecurity, and domestic AI policy. The Ministry of Science and ICT confirmed the meeting included Vice Minister Ryu Je-myung, representatives from South Korea&#8217;s AI Safety Institute and Korea Internet &amp; Security Agency, and Anthropic&#8217;s global affairs head Michael Sellitto. South Korea proposed cybersecurity partnerships, requested information sharing for vulnerability disclosures, and discussed collaboration on AI safety policy including the country&#8217;s AI Basic Act. <strong><a href="https://www.cybermaterial.com/p/anthropic-south-korea-discuss-ai">Read More</a></strong></p><div><hr></div><h2><strong>&#128187; CAREER ENABLEMENT</strong></h2><div><hr></div><p><strong>Arkansas State launches cybersecurity training center</strong></p><p>Arkansas State University is launching a student-operated cybersecurity program this fall in partnership with Kalmer Solutions, creating the Red Wolf Security Operations Center where six students per semester will monitor threats and protect university networks. Students will work scheduled shifts gaining hands-on experience in cybersecurity operations while receiving mentorship and training from Kalmer Solutions, which will also fund a coordinator position and graduate assistant stipends. The program includes professional development workshops and research projects in automation and artificial intelligence, with plans to expand across the Arkansas State University System. <a href="https://www.cybermaterial.com/p/arkansas-state-launches-cybersecurity">Read More</a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HL0l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><a href="https://www.cybermaterial.com/s/documents">Click Here To Read</a></p><div><hr></div><p>Copyright &#169; 2026 <a href="http://cybermaterial.com/">CyberMaterial</a>. All Rights Reserved.</p><p style="text-align: justify;">Follow CyberMaterial on:</p><p style="text-align: justify;"><a href="https://www.cybermaterial.com/">Substack</a>,<a href="https://www.linkedin.com/company/cybermaterial/"> LinkedIn</a>,<a href="https://twitter.com/cybermaterial_"> Twitter</a>,<a href="https://www.reddit.com/r/cybermaterial/"> Reddit</a>,<a href="https://instagram.com/Cybermat3rial"> Instagram</a>,<a href="https://www.facebook.com/cybermaterial"> Facebook</a>,<a href="https://www.youtube.com/@cybermaterial"> YouTube</a>, and<a href="https://cybermaterial.medium.com/"> Medium</a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Cyber Briefing: 2026.05.08]]></title><description><![CDATA[Emergence of the PamDOORa SSH backdoor, widespread social engineering via the Vidar Stealer "ClickFix" campaign, a disruptive cyberattack on the Canvas learning platform, and a significant data breach]]></description><link>https://www.cybermaterial.com/p/cyber-briefing-20260507-ebd</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cyber-briefing-20260507-ebd</guid><dc:creator><![CDATA[CyberMaterial]]></dc:creator><pubDate>Fri, 08 May 2026 14:02:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!pwtO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07e8c4f7-78d1-4c4c-bccc-fcd62876234b_700x394.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pwtO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07e8c4f7-78d1-4c4c-bccc-fcd62876234b_700x394.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pwtO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07e8c4f7-78d1-4c4c-bccc-fcd62876234b_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!pwtO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07e8c4f7-78d1-4c4c-bccc-fcd62876234b_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!pwtO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07e8c4f7-78d1-4c4c-bccc-fcd62876234b_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!pwtO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07e8c4f7-78d1-4c4c-bccc-fcd62876234b_700x394.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pwtO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07e8c4f7-78d1-4c4c-bccc-fcd62876234b_700x394.png" width="700" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/07e8c4f7-78d1-4c4c-bccc-fcd62876234b_700x394.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:355032,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196897284?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07e8c4f7-78d1-4c4c-bccc-fcd62876234b_700x394.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!pwtO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07e8c4f7-78d1-4c4c-bccc-fcd62876234b_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!pwtO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07e8c4f7-78d1-4c4c-bccc-fcd62876234b_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!pwtO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07e8c4f7-78d1-4c4c-bccc-fcd62876234b_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!pwtO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07e8c4f7-78d1-4c4c-bccc-fcd62876234b_700x394.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Welcome to Cyber Briefing, your daily source for all things cybersecurity. We bring you the latest advisories, alerts, incidents, and news every weekday.</p><p style="text-align: justify;">Today&#8217;s briefing shows a shift toward sophisticated credential theft and social engineering. The &#8220;PamDOORa&#8221; Linux backdoor represents a critical risk to server integrity by compromising the Pluggable Authentication Module (PAM) to grant attackers persistent SSH access. Simultaneously, the &#8220;ClickFix&#8221; campaign targeting WordPress sites demonstrates the effectiveness of social engineering, as attackers trick users into manually executing malicious commands to install the Vidar Stealer, effectively bypassing automated security defenses.</p><p style="text-align: justify;">Real-world impacts have recently manifested through significant service disruptions and data exposure across multiple sectors. Critical infrastructure and service providers faced major hurdles, including a Canvas cyberattack that disrupted academic finals and a power-induced AWS outage in the US-EAST-1 region that hindered enterprise operations. Furthermore, the retail sector remains a prime target, as evidenced by a data breach at Zara that exposed the personal information of nearly 200,000 customers.</p><p>Listen to our podcast here &#9196;</p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8a426b057dd2e0c473f0f32288&quot;,&quot;title&quot;:&quot;May 08, 2026 - Cyber Briefing&quot;,&quot;subtitle&quot;:&quot;CyberMaterial&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/6t5Uk6A9KhvWRlgI8mFs2d&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/6t5Uk6A9KhvWRlgI8mFs2d" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zkJR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" width="1456" height="223" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:223,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://amzn.to/3Kw14fw&quot;,&quot;text&quot;:&quot;Get BlueSleuth-Lite&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://amzn.to/3Kw14fw"><span>Get BlueSleuth-Lite</span></a></p><div><hr></div><h2>&#9889;THREAT LANDSCAPE</h2><div><hr></div><p><strong>PamDOORa Linux Backdoor Steals SSH Credentials</strong></p><p>A new Linux backdoor called PamDOORa is being sold on Russian cybercrime forums for $1,600, designed to maintain persistent SSH access through compromised systems. The malware operates as a Pluggable Authentication Module (PAM) toolkit that allows attackers to bypass authentication using a secret password and specific TCP port combination. Organizations running Linux servers with SSH access should audit their PAM configurations and monitor for unauthorized modifications to authentication modules. <a href="https://www.cybermaterial.com/p/pamdoora-linux-backdoor-steals-ssh">Read More</a></p><p><strong>ACSC Warns of ClickFix Vidar Stealer Campaign</strong></p><p>The Australian Cyber Security Centre warns that attackers are using compromised WordPress sites and fake CAPTCHA prompts to trick users into installing Vidar Stealer, a password-stealing malware active since 2018. The campaign uses a social engineering method called ClickFix that convinces victims to manually run malicious commands, bypassing traditional security tools. Organizations should restrict unauthorized application execution, patch WordPress and browsers, block clipboard access from untrusted web content, and enforce phishing-resistant multi-factor authentication.<strong> <a href="https://www.cybermaterial.com/p/acsc-warns-of-clickfix-vidar-stealer">Read More</a></strong></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!llmP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.youtube.com/@cybermaterial&quot;,&quot;text&quot;:&quot;Subscribe Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.youtube.com/@cybermaterial"><span>Subscribe Now</span></a></p><div><hr></div><h2><strong>&#128680;INCIDENTS &amp; REAL-WORLD IMPACT</strong></h2><div><hr></div><p> <strong>Canvas Learning Platform Hit by Cyberattack</strong></p><p>Canvas, a widely used learning management system serving thousands of schools and universities, suffered a cyberattack that took the platform offline during final exam periods. The outage disrupted students&#8217; ability to access course materials and study resources at a critical time in the academic calendar. Educational institutions relying on Canvas should communicate alternative access methods to students and monitor official status updates for service restoration. <strong><a href="https://www.cybermaterial.com/p/canvas-learning-platform-hit-by-cyberattack">Read More</a></strong></p><p><strong>AWS EC2 outage in US-EAST-1 due to power loss</strong></p><p>Amazon Web Services experienced a power outage in its US-EAST-1 region on May 7, affecting EC2 instances and EBS volumes in the use1-az4 availability zone after a thermal event caused cooling system failures. The outage caused elevated error rates, increased latencies, and inaccessible resources for customers, with AWS reporting slower than expected progress in restoring normal temperatures. Organizations using the affected availability zone should shift workloads to other US-EAST-1 zones, though provisioning times are currently longer than usual. <a href="https://www.cybermaterial.com/p/aws-ec2-outage-in-us-east-1-due-to">Read More</a></p><p><strong>Zara data breach exposes 197,000 customers</strong></p><p>Spanish fashion retailer Zara suffered a data breach affecting over 197,000 customers, with hackers gaining unauthorized access to company databases. The compromised information includes customer data that has now appeared in breach notification databases. Affected customers should monitor their accounts for suspicious activity and remain vigilant against potential phishing attempts using the stolen information. <a href="https://www.cybermaterial.com/p/zara-data-breach-exposes-197000-customers">Read More</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MGQE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><h2><strong>&#128275; EXECUTIVE RISK &amp; CYBERNOMICS</strong></h2><div><hr></div><p><strong>25M Alerts Reveal Enterprise Alert Fatigue</strong></p><p>A new report analyzing over 25 million security alerts from enterprise environments reveals that security teams have systematically adopted practices of ignoring alerts, a phenomenon known as alert fatigue. The study examined 10 million monitored endpoints and found that the overwhelming volume of informational and low-severity alerts has led defenders to institutionalize the practice of not investigating warnings. Organizations need to implement better alert prioritization, tuning, and automation to reduce noise and ensure critical threats receive proper attention. <a href="https://www.cybermaterial.com/p/25m-alerts-reveal-enterprise-alert">Read More</a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f7lS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" width="1456" height="349" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:349,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69329,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195026538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/services/&quot;,&quot;text&quot;:&quot;Get Help&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/services/"><span>Get Help</span></a></p><div><hr></div><h2><strong>&#128737;&#65039; POLICY, REGULATION &amp; LEGAL SIGNALS</strong></h2><div><hr></div><p><strong>Meta challenges Ofcom fine calculation methodology</strong></p><p>Meta is challenging Ofcom in UK High Court over how fines are calculated under the Online Safety Act, arguing penalties should be based on UK revenue rather than global turnover. The law allows fines up to 10 percent of worldwide revenue or &#163;18 million (whichever is higher), which for Meta&#8217;s $201 billion annual revenue could mean massive penalties. Meta claims Ofcom&#8217;s methodology is disproportionate and wants fines calculated only on revenue from regulated services in the UK.<a href="https://www.cybermaterial.com/p/meta-challenges-ofcom-fine-calculation"> </a><strong><a href="https://www.cybermaterial.com/p/meta-challenges-ofcom-fine-calculation">Read More</a></strong></p><div><hr></div><h2><strong>&#128187; CAREER ENABLEMENT</strong></h2><div><hr></div><p><strong>2026 ChicagoCISO ORBIE Awards Honor Security Leaders</strong></p><p>The 2026 ChicagoCISO ORBIE Awards recognized outstanding chief information security officers from major organizations including CNA Financial, Paychex, Intermountain Health, Fitch Group, Hagerty Insurance, and Chicago Trading. The awards program honors security leaders who demonstrate excellence in cybersecurity leadership and innovation within their organizations. Security professionals seeking recognition or looking to benchmark their programs can review the award criteria and past winners. <a href="https://www.cybermaterial.com/p/2026-chicagociso-orbie-awards-honor">Read More</a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HL0l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><a href="https://www.cybermaterial.com/s/documents">Click Here To Read</a></p><div><hr></div><p>Copyright &#169; 2026 <a href="http://cybermaterial.com/">CyberMaterial</a>. All Rights Reserved.</p><p style="text-align: justify;">Follow CyberMaterial on:</p><p style="text-align: justify;"><a href="https://www.cybermaterial.com/">Substack</a>,<a href="https://www.linkedin.com/company/cybermaterial/"> LinkedIn</a>,<a href="https://twitter.com/cybermaterial_"> Twitter</a>,<a href="https://www.reddit.com/r/cybermaterial/"> Reddit</a>,<a href="https://instagram.com/Cybermat3rial"> Instagram</a>,<a href="https://www.facebook.com/cybermaterial"> Facebook</a>,<a href="https://www.youtube.com/@cybermaterial"> YouTube</a>, and<a href="https://cybermaterial.medium.com/"> Medium</a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Cyber Briefing: 2026.05.07]]></title><description><![CDATA[Cybercriminals are increasingly exploiting AI-related trust through malware-laden installers and filter-evasive phishing, while a major supply chain breach in Daemon Tools and widespread data exposure]]></description><link>https://www.cybermaterial.com/p/cyber-briefing-20260507</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cyber-briefing-20260507</guid><dc:creator><![CDATA[CyberMaterial]]></dc:creator><pubDate>Thu, 07 May 2026 14:01:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!XGUl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F689f513c-03b5-46f3-b1de-b764b9ed1db3_700x394.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XGUl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F689f513c-03b5-46f3-b1de-b764b9ed1db3_700x394.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XGUl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F689f513c-03b5-46f3-b1de-b764b9ed1db3_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!XGUl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F689f513c-03b5-46f3-b1de-b764b9ed1db3_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!XGUl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F689f513c-03b5-46f3-b1de-b764b9ed1db3_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!XGUl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F689f513c-03b5-46f3-b1de-b764b9ed1db3_700x394.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XGUl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F689f513c-03b5-46f3-b1de-b764b9ed1db3_700x394.png" width="700" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/689f513c-03b5-46f3-b1de-b764b9ed1db3_700x394.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:79496,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196770805?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F689f513c-03b5-46f3-b1de-b764b9ed1db3_700x394.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XGUl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F689f513c-03b5-46f3-b1de-b764b9ed1db3_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!XGUl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F689f513c-03b5-46f3-b1de-b764b9ed1db3_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!XGUl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F689f513c-03b5-46f3-b1de-b764b9ed1db3_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!XGUl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F689f513c-03b5-46f3-b1de-b764b9ed1db3_700x394.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Welcome to Cyber Briefing, your daily source for all things cybersecurity. We bring you the latest advisories, alerts, incidents, and news every weekday.</p><p style="text-align: justify;">The current threat landscape is defined by the weaponization of AI trust and the compromise of established software supply chains. Attackers are successfully deploying <strong>fake Claude AI installers</strong> via deceptive search ads and utilizing <strong>hidden text techniques</strong> to bypass AI-powered email filters, effectively turning the industry&#8217;s own tools into vectors for malware. Simultaneously, the <strong>Daemon Tools supply chain attack</strong>, which has remained active since early April 2026, demonstrates the persistent danger of compromised legitimate software binaries, with thousands of infections reported globally across retail and government sectors.</p><p style="text-align: justify;">As organizations pivot toward autonomous &#8220;agentic&#8221; AI, international intelligence alliances like the <strong>Five Eyes</strong> have issued urgent warnings regarding the lack of visibility into AI intent and the potential for these systems to act as &#8220;ultimate insider threats.&#8221; This risk is compounded by the rapid, often insecure, deployment of <strong>AI-generated web apps</strong>, which have already exposed sensitive corporate data due to a lack of fundamental access controls. While events like the <strong>Lloyds and Google Cloud hackathon</strong> emphasize that human judgment remains the critical firewall in this high-speed environment, legislative efforts like the <strong>UK Online Safety Act</strong> are facing early skepticism as children continue to easily circumvent mandated age verification protections.</p><p>Listen to our podcast here &#9196;</p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8a426b057dd2e0c473f0f32288&quot;,&quot;title&quot;:&quot;May 07, 2026 - Cyber Briefing&quot;,&quot;subtitle&quot;:&quot;CyberMaterial&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/6vg1zIXemaIN8cEd6fSDrS&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/6vg1zIXemaIN8cEd6fSDrS" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zkJR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" width="1456" height="223" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:223,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://amzn.to/3Kw14fw&quot;,&quot;text&quot;:&quot;Get BlueSleuth-Lite&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://amzn.to/3Kw14fw"><span>Get BlueSleuth-Lite</span></a></p><div><hr></div><h2>&#9889;THREAT LANDSCAPE</h2><div><hr></div><p><strong>Fake Claude AI Installers Spread Malware</strong></p><p style="text-align: justify;">Attackers are distributing malware through fake Claude AI installer pages promoted via Google Ads, targeting users searching for the legitimate AI assistant. The campaign uses convincing installation guides and a multi-stage infection process that exploits trusted Windows components and fileless execution techniques to avoid detection. Users should download Claude AI only from official Anthropic sources and verify URLs before installing any software promoted through search advertisements. <a href="https://www.cybermaterial.com/p/fake-claude-ai-installers-spread">Read More</a></p><p><strong>Scammers bypass AI email filters with hidden text</strong></p><p>Scammers are using hidden text in phishing emails to trick AI-powered email security filters into misclassifying malicious messages as legitimate. Attackers hide benign content from trusted brands or novels using zero-font HTML or color-matching techniques that are invisible to humans but readable by machine learning models. While these attacks currently represent less than 1% of observed traffic, security researchers warn the technique poses a growing threat as organizations increasingly rely on AI-powered email defenses. <a href="https://www.cybermaterial.com/p/scammers-bypass-ai-email-filters">Read More</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!llmP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.youtube.com/@cybermaterial&quot;,&quot;text&quot;:&quot;Subscribe Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.youtube.com/@cybermaterial"><span>Subscribe Now</span></a></p><div><hr></div><h2><strong>&#128680;INCIDENTS &amp; REAL-WORLD IMPACT</strong></h2><div><hr></div><p><strong>AI-Generated Apps Expose Corporate Data</strong></p><p style="text-align: justify;">AI-powered app-building platforms including Lovable, Base44, Replit, and Netlify have inadvertently exposed thousands of web applications containing highly sensitive corporate data to the public internet. These services allow users to create functional web apps in seconds using AI, but many developers failed to implement proper security controls, leaving databases, API keys, and confidential information accessible without authentication. Organizations should immediately audit any applications built using these platforms and implement access controls before deployment. <strong><a href="https://www.cybermaterial.com/p/ai-generated-apps-expose-corporate">Read More</a></strong></p><p><strong>Daemon Tools Trojanized in Supply Chain Attack</strong></p><p style="text-align: justify;">Disc Soft released Daemon Tools Lite version 12.6 on May 5 after discovering that version 12.5.1 had been compromised in a supply chain attack dating back to April 8. Kaspersky detected thousands of infection attempts across 100+ countries, with targeted payloads delivered to select victims in retail, government, manufacturing, and education sectors, including Quic RAT malware. Users who downloaded the affected version should uninstall it immediately, run a full system scan with trusted security software, and download the latest verified version from the official website. <strong><a href="https://www.cybermaterial.com/p/daemon-tools-trojanized-in-supply">Read More</a></strong></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MGQE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><h2><strong>&#128275; EXECUTIVE RISK &amp; CYBERNOMICS</strong></h2><div><hr></div><p><strong>NCSC and Five Eyes warn on agentic AI risks</strong></p><p>The UK&#8217;s National Cyber Security Centre (NCSC) and Five Eyes intelligence alliance have issued a warning to channel partners about security risks posed by agentic AI systems. Agentic AI refers to autonomous systems capable of making decisions and taking actions without human intervention. Organizations deploying these systems should implement strict access controls, monitoring, and validation processes to prevent misuse or unintended consequences. <strong><a href="https://www.cybermaterial.com/p/ncsc-and-five-eyes-warn-on-agentic">Read More</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f7lS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" width="1456" height="349" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:349,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69329,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195026538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/services/&quot;,&quot;text&quot;:&quot;Get Help&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/services/"><span>Get Help</span></a></p><div><hr></div><h2><strong>&#128737;&#65039; POLICY, REGULATION &amp; LEGAL SIGNALS</strong></h2><div><hr></div><p><strong>UK Online Safety Act effectiveness questioned</strong></p><p>A survey by UK&#8217;s Internet Matters found that the Online Safety Act, which took effect in July 2025, has produced limited improvements in protecting children online. While roughly half of children report seeing more age-appropriate content and 40% of families feel somewhat safer, nearly half of children say age verification checks are easy to bypass, with a third admitting to circumventing them using fake birthdates, borrowed logins, or spoofed faces. Almost half of children still encountered harmful content in the month after child protection codes launched, and parents remain concerned about privacy risks from age verification data collection.<a href="https://www.cybermaterial.com/p/uk-online-safety-act-effectiveness"> Read More</a></p><div><hr></div><h2><strong>&#128187; CAREER ENABLEMENT</strong></h2><div><hr></div><p><strong>Lloyds, Google Cloud host UK finance cyber hackathon</strong></p><p>Lloyds Banking Group, Hack The Box, and Google Cloud Security held a two-day cybersecurity hackathon for UK financial services, with 33 teams from 16 organizations competing in realistic threat scenarios. The competition tested skills in web exploitation, digital forensics, cryptography, and payment systems security, with exercises incorporating AI in both attack and defense contexts. The event emphasized that while AI tools can automate routine tasks, human judgment remains critical for making decisions under pressure in interconnected financial systems where incidents can escalate rapidly. <a href="https://www.cybermaterial.com/p/lloyds-google-cloud-host-uk-finance">Read More</a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HL0l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><a href="https://www.cybermaterial.com/s/documents">Click Here To Read</a></p><div><hr></div><p>Copyright &#169; 2026 <a href="http://cybermaterial.com/">CyberMaterial</a>. All Rights Reserved.</p><p style="text-align: justify;">Follow CyberMaterial on:</p><p style="text-align: justify;"><a href="https://www.cybermaterial.com/">Substack</a>,<a href="https://www.linkedin.com/company/cybermaterial/"> LinkedIn</a>,<a href="https://twitter.com/cybermaterial_"> Twitter</a>,<a href="https://www.reddit.com/r/cybermaterial/"> Reddit</a>,<a href="https://instagram.com/Cybermat3rial"> Instagram</a>,<a href="https://www.facebook.com/cybermaterial"> Facebook</a>,<a href="https://www.youtube.com/@cybermaterial"> YouTube</a>, and<a href="https://cybermaterial.medium.com/"> Medium</a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Cyber Briefing: 2026.05.06]]></title><description><![CDATA[Ongoing threats are characterized by the QLNX malware targeting developers and CISA&#8217;s warnings for infrastructure, while recent incidents include a 119K-user breach at Vimeo via a third-party vendor]]></description><link>https://www.cybermaterial.com/p/cyber-briefing-20260506</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cyber-briefing-20260506</guid><dc:creator><![CDATA[CyberMaterial]]></dc:creator><pubDate>Wed, 06 May 2026 14:02:45 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!dLny!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55c53928-ddb7-4457-8ddd-350dbc9e036e_700x394.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dLny!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55c53928-ddb7-4457-8ddd-350dbc9e036e_700x394.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dLny!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55c53928-ddb7-4457-8ddd-350dbc9e036e_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!dLny!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55c53928-ddb7-4457-8ddd-350dbc9e036e_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!dLny!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55c53928-ddb7-4457-8ddd-350dbc9e036e_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!dLny!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55c53928-ddb7-4457-8ddd-350dbc9e036e_700x394.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dLny!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55c53928-ddb7-4457-8ddd-350dbc9e036e_700x394.png" width="700" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/55c53928-ddb7-4457-8ddd-350dbc9e036e_700x394.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:94075,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196650646?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55c53928-ddb7-4457-8ddd-350dbc9e036e_700x394.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dLny!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55c53928-ddb7-4457-8ddd-350dbc9e036e_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!dLny!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55c53928-ddb7-4457-8ddd-350dbc9e036e_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!dLny!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55c53928-ddb7-4457-8ddd-350dbc9e036e_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!dLny!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55c53928-ddb7-4457-8ddd-350dbc9e036e_700x394.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Welcome to Cyber Briefing, your daily source for all things cybersecurity. We bring you the latest advisories, alerts, incidents, and news every weekday.</p><p style="text-align: justify;">The current threat landscape is defined by a strategic push toward infrastructure resilience and specialized malware targeting the heart of the software supply chain. While CISA is actively mobilizing critical sectors like energy and healthcare to fortify their systems against large-scale disruptions, attackers are narrowing their focus on developers. The emergence of the <strong>Quasar Linux (QLNX)</strong> rootkit demonstrates a sophisticated shift toward compromising development environments to steal credentials and maintain long-term persistence, highlighting a need for heightened monitoring in technical workflows.</p><p>On the operational side, the reality of third-party risk and the evolution of AI-driven security are coming to the forefront. A significant breach at <strong>Vimeo</strong>, impacting 119,000 users through a vendor compromise, serves as a stark reminder of supply chain vulnerabilities, even as law enforcement successfully dismantled a major &#8364;50 million fraud ring in Europe. Simultaneously, the industry is pivoting toward &#8220;Cybernomics&#8221; and education; Cisco&#8217;s acquisition of Astrix Security underscores the urgent need to manage non-human identities in AI, while Virginia State University&#8217;s new $1.03 million research center signals a long-term commitment to defending industrial systems from AI-accelerated threats.</p><p>Listen to our podcast here &#9196;</p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8a426b057dd2e0c473f0f32288&quot;,&quot;title&quot;:&quot;May 06, 2026 - Cyber Briefing&quot;,&quot;subtitle&quot;:&quot;CyberMaterial&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/1YivyvbulZkbCuDVynyTfz&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/1YivyvbulZkbCuDVynyTfz" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zkJR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" width="1456" height="223" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:223,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://amzn.to/3Kw14fw&quot;,&quot;text&quot;:&quot;Get BlueSleuth-Lite&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://amzn.to/3Kw14fw"><span>Get BlueSleuth-Lite</span></a></p><div><hr></div><h2>&#9889;THREAT LANDSCAPE</h2><div><hr></div><p> <strong>CISA urges critical infrastructure fortification</strong></p><p style="text-align: justify;">The Cybersecurity and Infrastructure Security Agency (CISA) has issued guidance urging critical infrastructure operators to strengthen their systems against potential disruptions during major incidents. The agency is providing resources and recommendations to help organizations maintain operational continuity when facing cyber threats or other emergencies. Critical infrastructure sectors including energy, water, healthcare, and transportation are encouraged to review and implement the protective measures outlined in CISA&#8217;s guidance. <a href="https://www.cybermaterial.com/p/cisa-urges-critical-infrastructure">Read More</a></p><p style="text-align: justify;"><strong>Quasar Linux malware targets developers</strong></p><p style="text-align: justify;">A new Linux malware called Quasar Linux (QLNX) is actively targeting software developers with rootkit, backdoor, and credential-stealing capabilities. The implant operates stealthily on compromised systems, combining multiple attack techniques to maintain persistence and exfiltrate sensitive data. Developers should review their systems for indicators of compromise, implement enhanced monitoring, and follow security best practices for development environments. <a href="https://www.cybermaterial.com/p/quasar-linux-malware-targets-developers">Read More</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!llmP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.youtube.com/@cybermaterial&quot;,&quot;text&quot;:&quot;Subscribe Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.youtube.com/@cybermaterial"><span>Subscribe Now</span></a></p><div><hr></div><h2><strong>&#128680;INCIDENTS &amp; REAL-WORLD IMPACT</strong></h2><div><hr></div><p><strong>Vimeo breach via Anodot vendor impacts 119K users</strong></p><p>Vimeo disclosed a data breach affecting 119,000 users after the ShinyHunters cybercrime group accessed user information through a compromised third-party analytics vendor, Anodot, in April 2026. The exposed data includes email addresses, names, video titles, and technical metadata, but does not include video content, login credentials, or payment information. Vimeo has disabled Anodot&#8217;s access, engaged external security experts, and notified law enforcement while the investigation continues. <strong><a href="https://www.cybermaterial.com/p/vimeo-breach-via-anodot-vendor-impacts">Read More</a></strong></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MGQE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><h2><strong>&#128275; EXECUTIVE RISK &amp; CYBERNOMICS</strong></h2><div><hr></div><p><strong>Cisco Acquires Astrix Security for AI Agent Protection</strong></p><p>Cisco announced plans to acquire Astrix Security, a specialist in Non-Human Identity (NHI) security, to address vulnerabilities created by AI agents in enterprise environments. AI agents use non-human credentials like API keys and OAuth tokens to access systems, and if compromised, attackers can execute malicious actions at scale; currently only 24% of organizations have adequate controls for AI agent actions. The acquisition will integrate Astrix&#8217;s capabilities into Cisco&#8217;s security platform, enabling discovery, lifecycle management, threat detection, and secrets management for AI agents under a Zero Trust model. <strong><a href="https://www.cybermaterial.com/p/cisco-acquires-astrix-security-for">Read More</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f7lS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" width="1456" height="349" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:349,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69329,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195026538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/services/&quot;,&quot;text&quot;:&quot;Get Help&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/services/"><span>Get Help</span></a></p><div><hr></div><h2><strong>&#128737;&#65039; POLICY, REGULATION &amp; LEGAL SIGNALS</strong></h2><div><hr></div><p><strong>EUR 50M Online Fraud Network Dismantled</strong></p><p>Austrian and Albanian authorities, supported by Europol and Eurojust, have dismantled a criminal network responsible for large-scale online fraud estimated at EUR 50 million over two years. The operation resulted in ten arrests and the seizure of nearly EUR 900,000 in cash following searches of multiple premises. Organizations should review their fraud detection systems and verify that customer authentication processes are robust against sophisticated social engineering attacks. <a href="https://www.cybermaterial.com/p/eur-50m-online-fraud-network-dismantled">Read More</a></p><div><hr></div><h2><strong>&#128187; CAREER ENABLEMENT</strong></h2><div><hr></div><p><strong>VSU Awarded $1.03M for AI and Cybersecurity Center</strong></p><p>Virginia State University received $1.03 million in federal funding to establish a Center for Generative AI and Industrial Cybersecurity, announced during a May 5 campus visit by Congresswoman Jennifer McClellan. The center will research AI risks including misinformation, bias, and job displacement while focusing on protecting critical infrastructure systems from cyberattacks. Students and faculty will gain access to advanced AI tools and high-performance computing systems to build and test AI models for both research and real-world cybersecurity applications. <a href="https://www.cybermaterial.com/p/vsu-awarded-103m-for-ai-and-cybersecurity">Read More</a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HL0l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><a href="https://www.cybermaterial.com/s/documents">Click Here To Read</a></p><div><hr></div><p>Copyright &#169; 2026 <a href="http://cybermaterial.com/">CyberMaterial</a>. All Rights Reserved.</p><p style="text-align: justify;">Follow CyberMaterial on:</p><p style="text-align: justify;"><a href="https://www.cybermaterial.com/">Substack</a>,<a href="https://www.linkedin.com/company/cybermaterial/"> LinkedIn</a>,<a href="https://twitter.com/cybermaterial_"> Twitter</a>,<a href="https://www.reddit.com/r/cybermaterial/"> Reddit</a>,<a href="https://instagram.com/Cybermat3rial"> Instagram</a>,<a href="https://www.facebook.com/cybermaterial"> Facebook</a>,<a href="https://www.youtube.com/@cybermaterial"> YouTube</a>, and<a href="https://cybermaterial.medium.com/"> Medium</a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Cyber Briefing: 2026.05.05]]></title><description><![CDATA[Sophisticated supply chain attacks and critical hardware vulnerabilities are clashing with tougher legal enforcement and new attribution frameworks as the industry balances heightened risk against ...]]></description><link>https://www.cybermaterial.com/p/cyber-briefing-20260505</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cyber-briefing-20260505</guid><dc:creator><![CDATA[CyberMaterial]]></dc:creator><pubDate>Tue, 05 May 2026 14:02:22 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!C7Hy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe52ad7-8579-4343-bd68-a60be4b107b3_700x394.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!C7Hy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe52ad7-8579-4343-bd68-a60be4b107b3_700x394.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!C7Hy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe52ad7-8579-4343-bd68-a60be4b107b3_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!C7Hy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe52ad7-8579-4343-bd68-a60be4b107b3_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!C7Hy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe52ad7-8579-4343-bd68-a60be4b107b3_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!C7Hy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe52ad7-8579-4343-bd68-a60be4b107b3_700x394.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!C7Hy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe52ad7-8579-4343-bd68-a60be4b107b3_700x394.png" width="700" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/abe52ad7-8579-4343-bd68-a60be4b107b3_700x394.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:105657,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196535562?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe52ad7-8579-4343-bd68-a60be4b107b3_700x394.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!C7Hy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe52ad7-8579-4343-bd68-a60be4b107b3_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!C7Hy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe52ad7-8579-4343-bd68-a60be4b107b3_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!C7Hy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe52ad7-8579-4343-bd68-a60be4b107b3_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!C7Hy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe52ad7-8579-4343-bd68-a60be4b107b3_700x394.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Welcome to Cyber Briefing, your daily source for all things cybersecurity. We bring you the latest advisories, alerts, incidents, and news every weekday.</p><p style="text-align: justify;">The global threat landscape is currently dominated by high-impact supply chain compromises and critical infrastructure vulnerabilities. North Korean state-sponsored group ScarCruft has successfully pivoted to supply chain attacks by trojanizing gaming platforms to deploy the BirdCall backdoor, while Trellix, a major cybersecurity vendor, recently confirmed that threat actors gained unauthorized access to its source code repository. Simultaneously, hardware and software giants like Qualcomm and WhatsApp have rushed to patch critical flaws&#8212;ranging from remote code execution in chipsets to URL execution vulnerabilities in Instagram Reels integration&#8212;highlighting a persistent trend where attackers exploit trusted third-party integrations and ubiquitous hardware to gain foothold in diverse environments.</p><p style="text-align: justify;">On the regulatory and strategic front, the industry is seeing a shift toward more nuanced attribution and a reversal in privacy standards. The introduction of DarkAtlas&#8217;s campaign-based attribution framework represents a move away from rigid group labels toward a multi-layered, confidence-based model for tracking APT evolution. Meanwhile, legal systems are securing wins against cybercrime infrastructure, evidenced by the 8.5-year sentencing of a Latvian negotiator for the Karakurt ransomware group. However, user privacy faces a setback as Meta announces the discontinuation of end-to-end encryption for Instagram DMs, citing low adoption and shifting focus toward moderation and AI training capabilities.</p><p>Listen to our podcast here &#9196;</p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8a426b057dd2e0c473f0f32288&quot;,&quot;title&quot;:&quot;May 05, 2026 - Cyber Briefing&quot;,&quot;subtitle&quot;:&quot;CyberMaterial&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/2ZU1HrM1Qr5fVQFl9Ipg1B&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/2ZU1HrM1Qr5fVQFl9Ipg1B" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zkJR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" width="1456" height="223" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:223,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://amzn.to/3Kw14fw&quot;,&quot;text&quot;:&quot;Get BlueSleuth-Lite&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://amzn.to/3Kw14fw"><span>Get BlueSleuth-Lite</span></a></p><div><hr></div><h2>&#9889;THREAT LANDSCAPE</h2><div><hr></div><p><strong>CISA Adds Major Linux Kernel Vulnerability to Known Exploited Vulnerabilities Catalog</strong></p><p>The United States Cybersecurity and Infrastructure Security Agency has officially added CVE-2026-31431, a critical Linux Kernel flaw known as Copy Fail, to its list of exploited vulnerabilities. This high-severity bug allows unprivileged local users to gain root access across nearly all major Linux distributions by manipulating the system page cache. <strong><a href="https://www.cybermaterial.com/p/cisa-adds-major-linux-kernel-vulnerability">Read More</a></strong></p><p><strong>Cybercrime Syndicates Exploit Vishing and SSO Vulnerabilities for High-Speed Cloud Extortion</strong></p><p>Recent investigations into modern cyber threats reveal that sophisticated hacking groups are increasingly leveraging voice phishing and Single Sign-On weaknesses to execute rapid extortion campaigns against corporate SaaS environments. These attackers bypass traditional perimeter defenses by tricking employees into revealing credentials or approving multi-factor authentication prompts, allowing them to move laterally through cloud applications with unprecedented speed. <strong><a href="https://www.cybermaterial.com/p/cybercrime-syndicates-exploit-vishing">Read More</a></strong></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!llmP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.youtube.com/@cybermaterial&quot;,&quot;text&quot;:&quot;Subscribe Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.youtube.com/@cybermaterial"><span>Subscribe Now</span></a></p><div><hr></div><h2><strong>&#128680;INCIDENTS &amp; REAL-WORLD IMPACT</strong></h2><div><hr></div><p><strong>Trellix Confirms Unauthorized Source Code Access</strong></p><p>Trellix, a major US cybersecurity vendor formed from the 2021 merger of McAfee Enterprise and FireEye, disclosed on May 4 that threat actors gained unauthorized access to a portion of its source code repository. The company claims no evidence shows its code release or distribution process was compromised or that the stolen code has been exploited, though investigations continue with law enforcement and forensic experts. Security researchers warn that access to a security vendor&#8217;s source code provides attackers with detailed knowledge of detection mechanisms and potential supply chain attack vectors, particularly concerning recent campaigns targeting security tools like Trivy that exposed enterprise credentials.<a href="https://www.cybermaterial.com/p/trellix-confirms-unauthorized-source"> </a><strong><a href="https://www.cybermaterial.com/p/trellix-confirms-unauthorized-source">Read More</a></strong></p><p><strong>ScarCruft Compromises Gaming Platform</strong></p><p>North Korean state-sponsored hacking group ScarCruft compromised a video game platform in a supply chain attack, embedding the BirdCall backdoor into platform components. The attack specifically targets ethnic Koreans living in China, expanding beyond the backdoor&#8217;s previous Windows-only deployment. By trojanizing legitimate gaming software, the attackers can distribute malware to a broader user base through trusted update mechanisms. <strong><a href="https://www.cybermaterial.com/p/scarcruft-compromises-gaming-platform">Read More</a></strong></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MGQE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><h2><strong>&#128275; EXECUTIVE RISK &amp; CYBERNOMICS</strong></h2><div><hr></div><p><strong>New Attribution Framework for APT Campaign Tracking</strong></p><p>Security researchers at DarkAtlas have introduced a campaign-based attribution framework that tracks Advanced Persistent Threat (APT) groups by analyzing discrete operational clusters rather than assuming fixed group identities. The framework uses a multi-layered evidence model examining six dimensions (strategic, operational, tactical, technical, infrastructure, and human factors) to establish confidence-based connections between campaigns, addressing the problem that adversaries frequently change tools, infrastructure, and personnel. This approach replaces single-indicator attribution with a Campaign Linkage Graph that maps weighted relationships between operations, allowing analysts to track threat actor evolution without relying on rigid group labels. <strong><a href="https://www.cybermaterial.com/p/new-attribution-framework-for-apt">Read More</a></strong></p><p><strong>Instagram Discontinues End-to-End Encryption</strong></p><p>Meta will discontinue Instagram&#8217;s optional end-to-end encrypted direct messaging feature on May 8, 2026, citing low adoption rates. After this date, all Instagram direct messages will use standard transport encryption, meaning Meta&#8217;s servers can decrypt and access message content for moderation, AI training, and law enforcement requests. Users who previously used encrypted chats have until May 8 to export their encrypted message history before it becomes accessible to Meta&#8217;s systems.<strong> <a href="https://www.cybermaterial.com/p/instagram-discontinues-end-to-end">Read More</a></strong></p><p></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f7lS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" width="1456" height="349" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:349,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69329,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195026538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/services/&quot;,&quot;text&quot;:&quot;Get Help&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/services/"><span>Get Help</span></a></p><div><hr></div><h2><strong>&#128737;&#65039; POLICY, REGULATION &amp; LEGAL SIGNALS</strong></h2><div><hr></div><p><strong>Karakurt negotiator sentenced to 8.5 years</strong></p><p>A Latvian national has been sentenced to 8.5 years in U.S. prison for serving as a negotiator for the Karakurt ransomware group, a Russian cybercrime operation. The defendant was extradited to the United States to face charges related to his role in facilitating ransom negotiations between the criminal group and its victims. Organizations should review their incident response plans and ensure they have protocols for handling ransomware negotiations while cooperating with law enforcement.<a href="https://www.cybermaterial.com/p/karakurt-negotiator-sentenced-to"> </a><strong><a href="https://www.cybermaterial.com/p/karakurt-negotiator-sentenced-to">Read More</a></strong></p><div><hr></div><h2><strong>&#128187; CAREER ENABLEMENT</strong></h2><div><hr></div><p><strong>Carleton College launches student cybersecurity teams</strong></p><p>Carleton College has launched student cybersecurity teams with funding support from Shavlik to provide dedicated servers for training and competition. Information Security Officer Kendall George is directing the project across multiple colleges. The initiative aims to develop practical cybersecurity skills among students through hands-on team activities. <strong><a href="https://www.cybermaterial.com/p/carleton-college-launches-student">Read More</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HL0l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><a href="https://www.cybermaterial.com/s/documents">Click Here To Read</a></p><div><hr></div><p>Copyright &#169; 2026 <a href="http://cybermaterial.com/">CyberMaterial</a>. All Rights Reserved.</p><p style="text-align: justify;">Follow CyberMaterial on:</p><p style="text-align: justify;"><a href="https://www.cybermaterial.com/">Substack</a>,<a href="https://www.linkedin.com/company/cybermaterial/"> LinkedIn</a>,<a href="https://twitter.com/cybermaterial_"> Twitter</a>,<a href="https://www.reddit.com/r/cybermaterial/"> Reddit</a>,<a href="https://instagram.com/Cybermat3rial"> Instagram</a>,<a href="https://www.facebook.com/cybermaterial"> Facebook</a>,<a href="https://www.youtube.com/@cybermaterial"> YouTube</a>, and<a href="https://cybermaterial.medium.com/"> Medium</a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Cyber Briefing: 2026.05.04]]></title><description><![CDATA[From 'Copy Fail' kernels to cloud-speed extortion, the gap between discovery and disaster is disappearing.]]></description><link>https://www.cybermaterial.com/p/cyber-briefing-20260504</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cyber-briefing-20260504</guid><dc:creator><![CDATA[CyberMaterial]]></dc:creator><pubDate>Mon, 04 May 2026 14:03:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zkb8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8014e85b-bdf5-48c6-af7f-1d33bfc401ed_700x394.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zkb8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8014e85b-bdf5-48c6-af7f-1d33bfc401ed_700x394.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zkb8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8014e85b-bdf5-48c6-af7f-1d33bfc401ed_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!zkb8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8014e85b-bdf5-48c6-af7f-1d33bfc401ed_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!zkb8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8014e85b-bdf5-48c6-af7f-1d33bfc401ed_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!zkb8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8014e85b-bdf5-48c6-af7f-1d33bfc401ed_700x394.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zkb8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8014e85b-bdf5-48c6-af7f-1d33bfc401ed_700x394.png" width="700" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8014e85b-bdf5-48c6-af7f-1d33bfc401ed_700x394.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:223075,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196415461?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8014e85b-bdf5-48c6-af7f-1d33bfc401ed_700x394.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zkb8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8014e85b-bdf5-48c6-af7f-1d33bfc401ed_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!zkb8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8014e85b-bdf5-48c6-af7f-1d33bfc401ed_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!zkb8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8014e85b-bdf5-48c6-af7f-1d33bfc401ed_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!zkb8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8014e85b-bdf5-48c6-af7f-1d33bfc401ed_700x394.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Welcome to Cyber Briefing, your daily source for all things cybersecurity. We bring you the latest advisories, alerts, incidents, and news every weekday.</p><p style="text-align: justify;">The current threat landscape is defined by a volatile mix of high-speed cloud extortion and critical infrastructure vulnerabilities. From the widespread &#8220;Copy Fail&#8221; Linux kernel flaw to the &#8220;Salt Typhoon&#8221; infiltration of IBM subsidiaries, attackers are exploiting both deep-system bugs and human-centric weaknesses like vishing and SSO gaps. These incidents, coupled with a massive data breach at Instructure affecting millions, highlight a shift toward rapid, high-impact campaigns that bypass traditional defenses to compromise national digital sovereignty and global supply chains.</p><p style="text-align: justify;">Simultaneously, the integration of AI is fundamentally altering the pace of cybersecurity, with the UK NCSC warning that automated vulnerability discovery is forcing an era of &#8220;hyper-patching.&#8221; In response, the industry is pivoting toward quality over quantity; Google&#8217;s strategic shift in its bug bounty programs prioritizes human-driven, high-impact research to filter out AI-generated noise. As state-sponsored operatives face legal accountability in international courts, the focus for organizations has moved beyond simple perimeter defense toward systemic resilience and the mitigation of third-party risks.</p><p>Listen to our podcast here &#9196;</p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8a426b057dd2e0c473f0f32288&quot;,&quot;title&quot;:&quot;May 04, 2026 - Cyber Briefing&quot;,&quot;subtitle&quot;:&quot;CyberMaterial&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/4LYsJoByH8EuNCgDam6lIH&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/4LYsJoByH8EuNCgDam6lIH" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zkJR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" width="1456" height="223" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:223,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://amzn.to/3Kw14fw&quot;,&quot;text&quot;:&quot;Get BlueSleuth-Lite&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://amzn.to/3Kw14fw"><span>Get BlueSleuth-Lite</span></a></p><div><hr></div><h2>&#9889;THREAT LANDSCAPE</h2><div><hr></div><p><strong>CISA Adds Major Linux Kernel Vulnerability to Known Exploited Vulnerabilities Catalog</strong></p><p>The United States Cybersecurity and Infrastructure Security Agency has officially added CVE-2026-31431, a critical Linux Kernel flaw known as Copy Fail, to its list of exploited vulnerabilities. This high-severity bug allows unprivileged local users to gain root access across nearly all major Linux distributions by manipulating the system page cache. <a href="https://www.cybermaterial.com/p/cisa-adds-major-linux-kernel-vulnerability">Read More</a></p><p><strong>Cybercrime Syndicates Exploit Vishing and SSO Vulnerabilities for High-Speed Cloud Extortion</strong></p><p>Recent investigations into modern cyber threats reveal that sophisticated hacking groups are increasingly leveraging voice phishing and Single Sign-On weaknesses to execute rapid extortion campaigns against corporate SaaS environments. These attackers bypass traditional perimeter defenses by tricking employees into revealing credentials or approving multi-factor authentication prompts, allowing them to move laterally through cloud applications with unprecedented speed. <a href="https://www.cybermaterial.com/p/cybercrime-syndicates-exploit-vishing">Read More</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!llmP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.youtube.com/@cybermaterial&quot;,&quot;text&quot;:&quot;Subscribe Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.youtube.com/@cybermaterial"><span>Subscribe Now</span></a></p><div><hr></div><h2><strong>&#128680;INCIDENTS &amp; REAL-WORLD IMPACT</strong></h2><div><hr></div><p><strong>Ubuntu Infrastructure Disruptions Linked to Coordinated DDoS Campaign</strong></p><p>Canonical and Ubuntu face widespread service interruptions following a targeted cyberattack claimed by a hacktivist collective. The ongoing incident has disabled essential web systems and repository access, leaving millions of users temporarily unable to perform routine system updates or software installations.<a href="https://www.cybermaterial.com/p/ubuntu-infrastructure-disruptions"> Read More</a></p><p><strong>ShinyHunters Targets Instructure in Massive Data Breach Affecting Millions</strong></p><p>Educational technology giant Instructure has confirmed a security breach involving its Canvas platform, with the ShinyHunters hacking group claiming to have stolen personal data from 275 million users. While the company acknowledges the exposure of names and messages, the attackers allege a much larger scale of theft involving thousands of schools and a compromise of the company&#8217;s Salesforce environment. <a href="https://www.cybermaterial.com/p/shinyhunters-targets-instructure">Read More</a></p><p><strong>Salt Typhoon Linked to IBM Subsidiary Breach</strong></p><p>&#8220;The April 2026 infiltration of IBM Italy subsidiary Sistemi Informativi has ignited urgent discussions regarding European digital sovereignty and the persistent threat of state-sponsored espionage. Attributed by intelligence sources to the China-linked group Salt Typhoon, the incident underscores the vulnerability of national infrastructure when managed by third-party IT providers. <a href="https://www.cybermaterial.com/p/salt-typhoon-linked-to-ibm-subsidiary">Read More</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MGQE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><h2><strong>&#128275; EXECUTIVE RISK &amp; CYBERNOMICS</strong></h2><div><hr></div><p><strong>AI accelerates vulnerability discovery and forces rapid updates according to UK NCSC</strong></p><p>The National Cyber Security Centre warns that artificial intelligence is significantly shortening the time it takes for attackers to find and exploit software vulnerabilities. This trend is expected to trigger a massive wave of urgent security patches as hidden flaws across the global technology ecosystem are exposed at an unprecedented pace.<a href="https://www.cybermaterial.com/p/ai-accelerates-vulnerability-discovery"> Read More</a></p><p></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f7lS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" width="1456" height="349" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:349,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69329,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195026538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/services/&quot;,&quot;text&quot;:&quot;Get Help&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/services/"><span>Get Help</span></a></p><div><hr></div><h2><strong>&#128737;&#65039; POLICY, REGULATION &amp; LEGAL SIGNALS</strong></h2><div><hr></div><p><strong>Russian cyber operative admits to sabotaging international energy infrastructure</strong></p><p>A Russian hacker linked to state-sponsored attacks on global oil and gas systems has pleaded guilty in a U.S. federal court. Artem Vladimirovich Revenskii faces a potential 27-year prison sentence for his role in damaging critical infrastructure across multiple nations, including the United States and Ukraine. <a href="https://www.cybermaterial.com/p/russian-cyber-operative-admits-to">Read More</a></p><div><hr></div><h2><strong>&#128187; CAREER ENABLEMENT</strong></h2><div><hr></div><p><strong>Google Shifts Bug Bounty Focus Toward High Impact Exploits and Android Security</strong></p><p>Google has overhauled its vulnerability reward programs for Android and Chrome to prioritize high-quality research over the high volume of reports generated by artificial intelligence. The update reflects a strategic pivot toward incentivizing human-driven insights and actionable fixes as automated tools continue to flood the system with low-value submissions.<a href="https://www.cybermaterial.com/p/google-shifts-bug-bounty-focus-toward">Read More</a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HL0l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><a href="https://www.cybermaterial.com/s/documents">Click Here To Read</a></p><div><hr></div><p>Copyright &#169; 2026 <a href="http://cybermaterial.com/">CyberMaterial</a>. All Rights Reserved.</p><p style="text-align: justify;">Follow CyberMaterial on:</p><p style="text-align: justify;"><a href="https://www.cybermaterial.com/">Substack</a>,<a href="https://www.linkedin.com/company/cybermaterial/"> LinkedIn</a>,<a href="https://twitter.com/cybermaterial_"> Twitter</a>,<a href="https://www.reddit.com/r/cybermaterial/"> Reddit</a>,<a href="https://instagram.com/Cybermat3rial"> Instagram</a>,<a href="https://www.facebook.com/cybermaterial"> Facebook</a>,<a href="https://www.youtube.com/@cybermaterial"> YouTube</a>, and<a href="https://cybermaterial.medium.com/"> Medium</a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Cyber Briefing: 2026.05.01]]></title><description><![CDATA[From hijacked PayPal invoices to malicious AI extensions, today&#8217;s landscape proves that even "trusted" tools and platforms are being weaponized to bypass your defenses.]]></description><link>https://www.cybermaterial.com/p/cyber-briefing-20260501</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cyber-briefing-20260501</guid><dc:creator><![CDATA[CyberMaterial]]></dc:creator><pubDate>Fri, 01 May 2026 14:01:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!NvJi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b9607ee-e9b2-4ce9-a829-ea45941a3204_700x394.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NvJi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b9607ee-e9b2-4ce9-a829-ea45941a3204_700x394.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NvJi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b9607ee-e9b2-4ce9-a829-ea45941a3204_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!NvJi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b9607ee-e9b2-4ce9-a829-ea45941a3204_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!NvJi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b9607ee-e9b2-4ce9-a829-ea45941a3204_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!NvJi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b9607ee-e9b2-4ce9-a829-ea45941a3204_700x394.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NvJi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b9607ee-e9b2-4ce9-a829-ea45941a3204_700x394.png" width="700" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b9607ee-e9b2-4ce9-a829-ea45941a3204_700x394.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:305390,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196106308?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b9607ee-e9b2-4ce9-a829-ea45941a3204_700x394.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NvJi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b9607ee-e9b2-4ce9-a829-ea45941a3204_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!NvJi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b9607ee-e9b2-4ce9-a829-ea45941a3204_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!NvJi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b9607ee-e9b2-4ce9-a829-ea45941a3204_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!NvJi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b9607ee-e9b2-4ce9-a829-ea45941a3204_700x394.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Welcome to Cyber Briefing, your daily source for all things cybersecurity. We bring you the latest advisories, alerts, incidents, and news every weekday.</p><p style="text-align: justify;">Today&#8217;s threat landscape highlights a sophisticated blend of technical and psychological exploits, ranging from <strong>malicious AI browser extensions</strong> capable of stealing passwords to the hijacking of legitimate <strong>PayPal email systems</strong> for tech support scams.</p><p style="text-align: justify;">The real-world impact is visible in the defacement and holding of <strong>Naturalsciences.org</strong> via ransomware, while the legal front saw significant victories with <strong>Europol dismantling a &#8364;50 million Albanian scam ring</strong> and the extradition of a major cybercrime platform operator. To counter these evolving risks, the industry is leaning into <strong>AI-driven security partnerships</strong> like Datalink and Arctic Wolf, alongside structured community defenses such as <strong>Patchstack&#8217;s specific bug bounty guidelines</strong> for WordPress vulnerabilities.</p><p>Listen to our podcast here &#9196;</p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8a426b057dd2e0c473f0f32288&quot;,&quot;title&quot;:&quot;May 01, 2026 - Cyber Briefing&quot;,&quot;subtitle&quot;:&quot;CyberMaterial&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/3tNCq6TtMgszXKC0wNEVdh&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/3tNCq6TtMgszXKC0wNEVdh" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zkJR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" width="1456" height="223" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:223,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://amzn.to/3Kw14fw&quot;,&quot;text&quot;:&quot;Get BlueSleuth-Lite&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://amzn.to/3Kw14fw"><span>Get BlueSleuth-Lite</span></a></p><div><hr></div><h2>&#9889;THREAT LANDSCAPE</h2><div><hr></div><p><strong>High-Risk AI Browser Extensions Exposed</strong></p><p>Unit 42 has identified high-risk AI browser extensions that pose a significant threat to users by stealing data, intercepting prompts, and exfiltrating passwords. These extensions are often disguised as productivity tools, making them difficult to detect. Users should protect their browsers by being cautious about the extensions they install and regularly reviewing their permissions. <a href="https://www.cybermaterial.com/p/high-risk-ai-browser-extensions-exposed">Read More</a></p><p><strong>PayPal Emails Hijacked for Tech Support Scams</strong></p><p>Scammers are exploiting PayPal&#8217;s email system to send deceptive messages that appear legitimate, tricking recipients into calling fake tech support numbers. These emails, which originate from a genuine PayPal address, contain misleading subject lines suggesting unauthorized charges, prompting recipients to contact scammers posing as PayPal support. To protect yourself, avoid calling numbers from suspicious emails, report such emails to PayPal, and use official contact methods to verify any claims. <a href="https://www.cybermaterial.com/p/paypal-emails-hijacked-for-tech-support">Read More</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!llmP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.youtube.com/@cybermaterial&quot;,&quot;text&quot;:&quot;Subscribe Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.youtube.com/@cybermaterial"><span>Subscribe Now</span></a></p><div><hr></div><h2><strong>&#128680;INCIDENTS &amp; REAL-WORLD IMPACT</strong></h2><div><hr></div><p><strong>Ransom note appears on Naturalsciences.org</strong></p><p>Naturalsciences.org was targeted by a cyberattack, resulting in a ransom note appearing on the website. The site was temporarily taken offline with a message indicating it was down for construction. It is unclear if the organization paid the ransom, but the site is partially back online; affected parties should monitor for further updates and ensure their cybersecurity measures are robust.<a href="https://www.cybermaterial.com/p/ransom-note-appears-on-naturalsciencesorg"> Read More</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MGQE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><h2><strong>&#128275; EXECUTIVE RISK &amp; CYBERNOMICS</strong></h2><div><hr></div><p><strong>Datalink Partners with Arctic Wolf for AI Security</strong></p><p>Datalink Networks has partnered with Arctic Wolf to provide AI-driven security operations to its customers in the U.S. and Canada. This collaboration allows Datalink&#8217;s clients to access Arctic Wolf&#8217;s security operations portfolio, which enhances detection, investigation, response, and recovery capabilities without the need for a full in-house security operations center. Customers are advised to leverage this partnership to improve their security posture, especially if they lack the internal resources to manage security operations independently. <a href="https://www.cybermaterial.com/p/datalink-partners-with-arctic-wolf">Read More</a></p><p></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f7lS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" width="1456" height="349" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:349,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69329,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195026538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/services/&quot;,&quot;text&quot;:&quot;Get Help&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/services/"><span>Get Help</span></a></p><div><hr></div><h2><strong>&#128737;&#65039; POLICY, REGULATION &amp; LEGAL SIGNALS</strong></h2><div><hr></div><p><strong>Europol Busts Albanian Scam Call Centers</strong></p><p>Europol has dismantled a sophisticated Albanian scam call center operation, arresting 10 individuals and seizing significant assets. The network, which defrauded victims across multiple countries including Austria, Italy, and the UK, used professional tactics to lure individuals into fake investment schemes, resulting in losses of at least &#8364;50 million. Affected individuals are advised to be cautious of unsolicited investment offers and to report any suspicious activities to authorities.<a href="https://www.cybermaterial.com/p/europol-busts-albanian-scam-call"> Read More</a></p><p><strong>Versus Project Operator Extradited to US</strong></p><p>A German national residing in Colombia has been extradited to the United States on charges related to operating &#8216;The Versus Project&#8217;, a cybercrime platform. This extradition is part of a broader effort by the Department of Justice to combat cybercrime, which also included sentencing two individuals involved with BlackCat ransomware. Organizations should remain vigilant and ensure their cybersecurity measures are up-to-date to protect against such threats. <a href="https://www.cybermaterial.com/p/versus-project-operator-extradited">Read More</a></p><div><hr></div><h2><strong>&#128187; CAREER ENABLEMENT</strong></h2><div><hr></div><p><strong>Patchstack Bug Bounty Guidelines</strong></p><p>Patchstack has outlined specific guidelines for their Bug Bounty Program, focusing on vulnerabilities in WordPress core, plugins, and themes distributed through recognized repositories. The program targets vulnerabilities with a significant security impact, requiring a CVSS v3.1 base score of 6.5 or higher, and components with a substantial number of active installs. Reports must adhere to these guidelines, and submissions that fall outside the defined scope or lack verifiable information will be rejected. <a href="https://www.cybermaterial.com/p/patchstack-bug-bounty-guidelines">Read More</a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HL0l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><a href="https://www.cybermaterial.com/s/documents">Click Here To Read</a></p><div><hr></div><p>Copyright &#169; 2026 <a href="http://cybermaterial.com/">CyberMaterial</a>. All Rights Reserved.</p><p style="text-align: justify;">Follow CyberMaterial on:</p><p style="text-align: justify;"><a href="https://www.cybermaterial.com/">Substack</a>,<a href="https://www.linkedin.com/company/cybermaterial/"> LinkedIn</a>,<a href="https://twitter.com/cybermaterial_"> Twitter</a>,<a href="https://www.reddit.com/r/cybermaterial/"> Reddit</a>,<a href="https://instagram.com/Cybermat3rial"> Instagram</a>,<a href="https://www.facebook.com/cybermaterial"> Facebook</a>,<a href="https://www.youtube.com/@cybermaterial"> YouTube</a>, and<a href="https://cybermaterial.medium.com/"> Medium</a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Cyber Briefing: 2026.04.30]]></title><description><![CDATA[he current cyber threat landscape is characterized by a volatile shift in malware dominance, notably with Vidar ascending...]]></description><link>https://www.cybermaterial.com/p/cyber-briefing-20260430</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cyber-briefing-20260430</guid><dc:creator><![CDATA[CyberMaterial]]></dc:creator><pubDate>Thu, 30 Apr 2026 14:02:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!KDmI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b944dde-59b0-482d-bfd4-f61b9c292e55_700x394.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!KDmI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b944dde-59b0-482d-bfd4-f61b9c292e55_700x394.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!KDmI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b944dde-59b0-482d-bfd4-f61b9c292e55_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!KDmI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b944dde-59b0-482d-bfd4-f61b9c292e55_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!KDmI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b944dde-59b0-482d-bfd4-f61b9c292e55_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!KDmI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b944dde-59b0-482d-bfd4-f61b9c292e55_700x394.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!KDmI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b944dde-59b0-482d-bfd4-f61b9c292e55_700x394.png" width="700" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7b944dde-59b0-482d-bfd4-f61b9c292e55_700x394.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:234862,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195992479?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b944dde-59b0-482d-bfd4-f61b9c292e55_700x394.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!KDmI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b944dde-59b0-482d-bfd4-f61b9c292e55_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!KDmI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b944dde-59b0-482d-bfd4-f61b9c292e55_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!KDmI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b944dde-59b0-482d-bfd4-f61b9c292e55_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!KDmI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b944dde-59b0-482d-bfd4-f61b9c292e55_700x394.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Welcome to Cyber Briefing, your daily source for all things cybersecurity. We bring you the latest advisories, alerts, incidents, and news every weekday.</p><p style="text-align: justify;">The current cyber threat landscape is characterized by a volatile shift in malware dominance, notably with Vidar ascending as the primary infostealer following law enforcement disruptions of its competitors. Emerging threats like PromptMink highlight a sophisticated evolution in attack vectors, where AI coding assistants are exploited to poison open-source dependencies and drain crypto wallets.</p><p style="text-align: justify;">Simultaneously, the ecosystem is witnessing internal friction among ransomware groups leaking each other&#8217;s data, while major breaches, such as the Sandhills Medical incident, continue to impact hundreds of thousands. In response, the industry is pivoting toward AI-driven defense roadmaps and increased international law enforcement action, while new professional communities like the Cybercrime Fighters Club aim to bridge the gap through collaborative intelligence.</p><p>Listen to our podcast here &#9196;</p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8a426b057dd2e0c473f0f32288&quot;,&quot;title&quot;:&quot;April 30, 2026 - Cyber Briefing&quot;,&quot;subtitle&quot;:&quot;CyberMaterial&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/1jLdTbt2ezxIYOE50NJCeP&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/1jLdTbt2ezxIYOE50NJCeP" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zkJR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" width="1456" height="223" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:223,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://amzn.to/3Kw14fw&quot;,&quot;text&quot;:&quot;Get BlueSleuth-Lite&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://amzn.to/3Kw14fw"><span>Get BlueSleuth-Lite</span></a></p><div><hr></div><h2>&#9889;THREAT LANDSCAPE</h2><div><hr></div><ol><li><p><strong>Vidar Rises to Top of Chaotic Infostealer Market</strong></p></li></ol><p>Vidar, a credential-stealing malware, has become the leading infostealer in the cybercriminal market after law enforcement actions disrupted its main competitors. This rise was facilitated by a major upgrade and expanded distribution network, making it a preferred tool for cybercriminals targeting corporate networks. To protect against Vidar, organizations should implement multifactor authentication, use DNS filtering, and deploy secure web gateways.<strong> <a href="https://www.cybermaterial.com/p/vidar-rises-to-top-of-chaotic-infostealer">Read More</a></strong></p><p></p><ol start="2"><li><p><strong>PromptMink Malware Targets Crypto Trading Agents</strong></p></li></ol><p>A new malware campaign named PromptMink has been discovered, targeting crypto trading agents by using AI coding assistants to introduce malicious code into open-source projects. The attack involves a seemingly harmless npm package that secretly imports a second, malicious package designed to steal sensitive credentials and gain access to crypto wallets. Developers should scrutinize AI-generated code commits, verify new dependencies, and monitor for unusual network activity to protect against such threats. <strong><a href="https://www.cybermaterial.com/p/promptmink-malware-targets-crypto">Read More</a></strong></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!llmP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.youtube.com/@cybermaterial&quot;,&quot;text&quot;:&quot;Subscribe Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.youtube.com/@cybermaterial"><span>Subscribe Now</span></a></p><div><hr></div><h2><strong>&#128680;INCIDENTS &amp; REAL-WORLD IMPACT</strong></h2><div><hr></div><ol start="3"><li><p><strong> Feuding Ransomware Groups Leak Each Other&#8217;s Data</strong></p></li></ol><p>Two emerging ransomware groups, 0APT and KryBit, have engaged in a feud that resulted in both leaking each other&#8217;s data. This conflict has exposed operational details and infrastructure vulnerabilities, offering valuable insights for cybersecurity defenders. Security professionals are advised to monitor for data staging and exfiltration, ensure backup integrity, and maintain robust anti-ransomware defenses. <strong><a href="https://www.cybermaterial.com/p/feuding-ransomware-groups-leak-each">Read More</a></strong></p><ol start="4"><li><p><strong>Sandhills Medical Ransomware Breach</strong></p></li></ol><p>Sandhills Medical has disclosed a data breach nearly a year after being targeted by the ransomware group Inc Ransom. The breach has affected 170,000 individuals, potentially compromising sensitive personal and medical information. Affected individuals should monitor their accounts for suspicious activity and consider identity theft protection services.<strong> <a href="https://www.cybermaterial.com/p/sandhills-medical-ransomware-breach">Read More</a></strong></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MGQE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><h2><strong>&#128275; EXECUTIVE RISK &amp; CYBERNOMICS</strong></h2><div><hr></div><ol start="5"><li><p><strong>OpenAI Cyber Defense Roadmap Released</strong></p></li></ol><p>OpenAI has introduced a cyber defense roadmap called &#8216;Cybersecurity in the Intelligence Age&#8217; to enhance security measures using AI tools. This initiative, led by Sasha Baker, aims to provide defenders with advanced capabilities to outpace malicious actors. Organizations should review this roadmap to understand how AI can be integrated into their security strategies to build resilience. <strong><a href="https://www.cybermaterial.com/p/openai-cyber-defense-roadmap-released">Read More</a></strong></p><p></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f7lS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" width="1456" height="349" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:349,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69329,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195026538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/services/&quot;,&quot;text&quot;:&quot;Get Help&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/services/"><span>Get Help</span></a></p><div><hr></div><h2><strong>&#128737;&#65039; POLICY, REGULATION &amp; LEGAL SIGNALS</strong></h2><div><hr></div><ol start="6"><li><p><strong>U.S. Charges Suspected Scattered Spider Member</strong></p></li></ol><p>Federal authorities have charged 19-year-old Peter Stokes, also known as &#8216;Bouquet&#8217;, for his alleged involvement with the cybercriminal group Scattered Spider. Stokes, a dual U.S. and Estonian citizen, was arrested in Helsinki while trying to board a flight to Japan. Those concerned about potential cyber threats should ensure their systems are updated and monitor for any suspicious activity. <strong><a href="https://www.cybermaterial.com/p/us-charges-suspected-scattered-spider">Read More</a></strong></p><ol start="7"><li><p><strong>Claude Mythos Fears Startle Japan&#8217;s Financial Sector</strong></p></li></ol><p>Japan&#8217;s financial sector is forming a task force to address potential threats posed by Anthropic&#8217;s new AI model, Mythos, which has demonstrated the ability to uncover previously unknown vulnerabilities in software systems. The concern is that Mythos could undermine the cybersecurity of financial institutions, potentially leading to severe disruptions. Organizations are advised to focus on strengthening their existing cybersecurity measures and not to overestimate the threat posed by Mythos, as similar vulnerabilities are often found by other models. <strong><a href="https://www.cybermaterial.com/p/claude-mythos-fears-startle-japans">Read More</a></strong></p><div><hr></div><h2><strong>&#128187; CAREER ENABLEMENT</strong></h2><div><hr></div><ol start="8"><li><p><strong>Cybercrime Fighters Club Launched</strong></p></li></ol><p>Group-IB has launched the Cybercrime Fighters Club, a community aimed at enhancing collaboration and knowledge sharing in the fight against cybercrime. The club operates on Discord and is open to cybersecurity professionals, enthusiasts, and those interested in learning about cyber threats. Participants can engage in discussions, share insights, and collaborate on researching emerging threats. <a href="https://www.cybermaterial.com/p/cybercrime-fighters-club-launched">Read More</a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HL0l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><a href="https://www.cybermaterial.com/s/documents">Click Here To Read</a></p><div><hr></div><p>Copyright &#169; 2026 <a href="http://cybermaterial.com/">CyberMaterial</a>. All Rights Reserved.</p><p style="text-align: justify;">Follow CyberMaterial on:</p><p style="text-align: justify;"><a href="https://www.cybermaterial.com/">Substack</a>,<a href="https://www.linkedin.com/company/cybermaterial/"> LinkedIn</a>,<a href="https://twitter.com/cybermaterial_"> Twitter</a>,<a href="https://www.reddit.com/r/cybermaterial/"> Reddit</a>,<a href="https://instagram.com/Cybermat3rial"> Instagram</a>,<a href="https://www.facebook.com/cybermaterial"> Facebook</a>,<a href="https://www.youtube.com/@cybermaterial"> YouTube</a>, and<a href="https://cybermaterial.medium.com/"> Medium</a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Cyber Briefing: 2026.04.29]]></title><description><![CDATA[Critical cybersecurity developments are currently defined by a volatile mix of technical vulnerabilities and aggressive global oversight]]></description><link>https://www.cybermaterial.com/p/cyber-briefing-20260429</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cyber-briefing-20260429</guid><dc:creator><![CDATA[CyberMaterial]]></dc:creator><pubDate>Wed, 29 Apr 2026 14:02:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!jpVU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff378a9d0-4955-4d57-a33a-0388618df63b_700x394.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jpVU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff378a9d0-4955-4d57-a33a-0388618df63b_700x394.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jpVU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff378a9d0-4955-4d57-a33a-0388618df63b_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!jpVU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff378a9d0-4955-4d57-a33a-0388618df63b_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!jpVU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff378a9d0-4955-4d57-a33a-0388618df63b_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!jpVU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff378a9d0-4955-4d57-a33a-0388618df63b_700x394.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jpVU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff378a9d0-4955-4d57-a33a-0388618df63b_700x394.png" width="700" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f378a9d0-4955-4d57-a33a-0388618df63b_700x394.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:72337,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195863519?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff378a9d0-4955-4d57-a33a-0388618df63b_700x394.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!jpVU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff378a9d0-4955-4d57-a33a-0388618df63b_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!jpVU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff378a9d0-4955-4d57-a33a-0388618df63b_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!jpVU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff378a9d0-4955-4d57-a33a-0388618df63b_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!jpVU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff378a9d0-4955-4d57-a33a-0388618df63b_700x394.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Welcome to Cyber Briefing, your daily source for all things cybersecurity. We bring you the latest advisories, alerts, incidents, and news every weekday.</p><p style="text-align: justify;">Critical cybersecurity developments are currently defined by a volatile mix of technical vulnerabilities and aggressive global oversight, ranging from the discovery of a destructive &#8220;wiper&#8221; flaw in <strong>Vect 2.0 ransomware</strong> to a major <strong>GitHub RCE vulnerability</strong> that threatened millions of repositories before being patched.</p><p>While <strong>Checkmarx</strong> and <strong>Polymarket</strong> navigate the fallout of data security incidents, the regulatory environment is tightening significantly with <strong>Meta</strong> facing a potential $12 billion EU fine over child safety and <strong>Canada</strong> proposing a ban on crypto ATMs to combat money laundering. In response to these escalating threats, the industry is pivoting toward AI-enhanced defenses via <strong>Malwarebytes</strong> and addressing the talent gap through the <strong>Pentagon&#8217;s</strong> new skill-based cyber apprenticeship program.</p><p>Listen to our podcast here &#9196;</p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8a426b057dd2e0c473f0f32288&quot;,&quot;title&quot;:&quot;April 29, 2026 - Cyber Briefing&quot;,&quot;subtitle&quot;:&quot;CyberMaterial&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/2P3sNuCO7JN80wgdnzvY8b&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/2P3sNuCO7JN80wgdnzvY8b" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zkJR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" width="1456" height="223" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:223,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://amzn.to/3Kw14fw&quot;,&quot;text&quot;:&quot;Get BlueSleuth-Lite&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://amzn.to/3Kw14fw"><span>Get BlueSleuth-Lite</span></a></p><div><hr></div><h2>&#9889;THREAT LANDSCAPE</h2><div><hr></div><ol><li><p><strong>Critical Flaw in Vect Ransomware</strong></p></li></ol><p>A critical flaw in the Vect 2.0 ransomware causes it to wipe large files instead of encrypting them, making recovery impossible. This flaw affects Windows, Linux, and VMware ESXi systems, and was discovered by Check Point Research. Organizations using these systems should ensure their security measures are up to date and consider additional protective measures against ransomware threats. <a href="https://www.cybermaterial.com/p/critical-flaw-in-vect-ransomware">Read More</a></p><ol start="2"><li><p><strong>GitHub fixes critical remote code execution flaw</strong></p></li></ol><p>GitHub recently addressed a critical remote code execution vulnerability in their internal git infrastructure, which was discovered by Wiz Research using AI models. This flaw could have potentially allowed attackers to access millions of public and private code repositories. GitHub&#8217;s security team quickly validated the issue and deployed a fix within six hours to protect their users&#8217; data. <a href="https://www.cybermaterial.com/p/github-fixes-critical-remote-code">Read More</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!llmP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.youtube.com/@cybermaterial&quot;,&quot;text&quot;:&quot;Subscribe Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.youtube.com/@cybermaterial"><span>Subscribe Now</span></a></p><div><hr></div><h2><strong>&#128680;INCIDENTS &amp; REAL-WORLD IMPACT</strong></h2><div><hr></div><ol start="3"><li><p><strong>Checkmarx Data Stolen in Supply Chain Attack</strong></p></li></ol><p>Checkmarx has confirmed that data was stolen from its GitHub environment in a supply chain attack. The breach occurred on March 30, following the publication of malicious code by hackers. Organizations using Checkmarx&#8217;s services should review their security measures and monitor for any suspicious activity.<a href="https://www.cybermaterial.com/p/checkmarx-data-stolen-in-supply-chain"> Read More</a></p><ol start="4"><li><p><strong>Polymarket denies data breach claims</strong></p></li></ol><p>Polymarket, a prediction markets platform, has denied claims of a data breach after a hacker on the dark web alleged they had accessed private user details. The hacker, using the pseudonym &#8216;xorcat&#8217;, claimed to have stolen over 300,000 records, including 10,000 unique user profiles with sensitive information. Users are advised to monitor their accounts for any suspicious activity and ensure their security settings are up to date. <a href="https://www.cybermaterial.com/p/polymarket-denies-data-breach-claims">Read More</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MGQE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><h2><strong>&#128275; EXECUTIVE RISK &amp; CYBERNOMICS</strong></h2><div><hr></div><ol start="5"><li><p><strong>Malwarebytes integrates with Claude for scam checks</strong></p></li></ol><p>Malwarebytes has integrated its threat intelligence capabilities with AI tools ChatGPT and Claude to help users identify online scams more effectively. This integration allows users to check suspicious links, phone numbers, and email addresses directly within Claude, providing instant feedback on potential threats. To use this feature, users can connect Malwarebytes to Claude without needing a Malwarebytes account and receive trusted answers to their security queries. <a href="https://www.cybermaterial.com/p/malwarebytes-integrates-with-claude">Read More</a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f7lS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" width="1456" height="349" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:349,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69329,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195026538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/services/&quot;,&quot;text&quot;:&quot;Get Help&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/services/"><span>Get Help</span></a></p><div><hr></div><h2><strong>&#128737;&#65039; POLICY, REGULATION &amp; LEGAL SIGNALS</strong></h2><div><hr></div><ol start="6"><li><p><strong> Meta Faces EU DSA Violations</strong></p></li></ol><p>Meta is facing potential fines of up to $12 billion for violating the European Union&#8217;s Digital Services Act by not adequately preventing children under 13 from using Facebook and Instagram. The European Commission&#8217;s preliminary decision highlights that Meta lacks sufficient measures to verify users&#8217; ages and remove underage users from its platforms. To comply, Meta must implement more effective age verification and user identification processes. <a href="https://www.cybermaterial.com/p/meta-faces-eu-dsa-violations">Read More</a></p><ol start="7"><li><p><strong>Canada proposes crypto ATM ban</strong></p></li></ol><p>The Canadian government has proposed a ban on Bitcoin and other cryptocurrency ATMs, citing their use by scammers and money launderers. The proposal, part of the Spring Economic Update 2026, aims to phase out these machines while allowing Canadians to purchase virtual currencies through traditional money services businesses. This move is intended to tighten oversight of high-risk areas in the cryptocurrency sector.<a href="https://www.cybermaterial.com/p/canada-proposes-crypto-atm-ban"> Read More</a></p><div><hr></div><h2><strong>&#128187; CAREER ENABLEMENT</strong></h2><div><hr></div><ol start="8"><li><p><strong>Pentagon launches cyber apprenticeship program</strong></p></li></ol><p>The Pentagon has launched a new cyber apprenticeship program aimed at filling technology and cybersecurity vacancies by focusing on skill-based hiring. This initiative is part of a broader effort by the administration to address the shortage of qualified professionals in these critical fields. Individuals interested in pursuing a career in cybersecurity are encouraged to apply for this program to gain the necessary skills and experience. <a href="https://www.cybermaterial.com/p/pentagon-launches-cyber-apprenticeship">Read More</a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HL0l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><a href="https://www.cybermaterial.com/s/documents">Click Here To Read</a></p><div><hr></div><p>Copyright &#169; 2026 <a href="http://cybermaterial.com/">CyberMaterial</a>. All Rights Reserved.</p><p style="text-align: justify;">Follow CyberMaterial on:</p><p style="text-align: justify;"><a href="https://www.cybermaterial.com/">Substack</a>,<a href="https://www.linkedin.com/company/cybermaterial/"> LinkedIn</a>,<a href="https://twitter.com/cybermaterial_"> Twitter</a>,<a href="https://www.reddit.com/r/cybermaterial/"> Reddit</a>,<a href="https://instagram.com/Cybermat3rial"> Instagram</a>,<a href="https://www.facebook.com/cybermaterial"> Facebook</a>,<a href="https://www.youtube.com/@cybermaterial"> YouTube</a>, and<a href="https://cybermaterial.medium.com/"> Medium</a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Cyber Briefing: 2026.04.28]]></title><description><![CDATA[Today's threat landscape is defined by a volatile mix of state-sponsored stealth, such as Sandworm&#8217;s use of SSH-over-Tor...]]></description><link>https://www.cybermaterial.com/p/cyber-briefing-20260428</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cyber-briefing-20260428</guid><dc:creator><![CDATA[CyberMaterial]]></dc:creator><pubDate>Tue, 28 Apr 2026 14:03:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!mZjF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6247821-3c74-4227-b33f-f7c7fc9984ec_700x394.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mZjF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6247821-3c74-4227-b33f-f7c7fc9984ec_700x394.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mZjF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6247821-3c74-4227-b33f-f7c7fc9984ec_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!mZjF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6247821-3c74-4227-b33f-f7c7fc9984ec_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!mZjF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6247821-3c74-4227-b33f-f7c7fc9984ec_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!mZjF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6247821-3c74-4227-b33f-f7c7fc9984ec_700x394.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mZjF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6247821-3c74-4227-b33f-f7c7fc9984ec_700x394.png" width="700" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c6247821-3c74-4227-b33f-f7c7fc9984ec_700x394.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:249701,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195744736?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6247821-3c74-4227-b33f-f7c7fc9984ec_700x394.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mZjF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6247821-3c74-4227-b33f-f7c7fc9984ec_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!mZjF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6247821-3c74-4227-b33f-f7c7fc9984ec_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!mZjF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6247821-3c74-4227-b33f-f7c7fc9984ec_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!mZjF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6247821-3c74-4227-b33f-f7c7fc9984ec_700x394.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Welcome to Cyber Briefing, your daily source for all things cybersecurity. We bring you the latest advisories, alerts, incidents, and news every weekday.</p><p style="text-align: justify;">Today&#8217;s threat landscape is defined by a volatile mix of state-sponsored stealth, such as <strong>Sandworm&#8217;s</strong> use of SSH-over-Tor, and high-stakes corporate breaches at firms like <strong>Itron</strong> and <strong>Medtronic</strong>, while a surge in <strong>SMS-based CAPTCHA fraud</strong> highlights the continued effectiveness of simple social engineering. Intellectual property remains a prime target, evidenced by the theft of sensitive aerospace software by Chinese actors, even as <strong>Proofpoint</strong> reports a widespread crisis of confidence regarding AI security controls.</p><p style="text-align: justify;">This escalating risk environment is being met with a hammer of regulatory enforcement, with <strong>DORA</strong> mandating stricter operational resilience in the EU and U.S. privacy fines hitting a staggering <strong>$3.45 billion</strong>, all while a stagnating, undervalued cybersecurity workforce threatens the very human foundation of global defense.</p><p>Listen to our podcast here &#9196;</p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8a426b057dd2e0c473f0f32288&quot;,&quot;title&quot;:&quot;April 28, 2026 - Cyber Briefing&quot;,&quot;subtitle&quot;:&quot;CyberMaterial&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/4NQIrwAh3o97uKj7v7eSR4&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/4NQIrwAh3o97uKj7v7eSR4" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zkJR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" width="1456" height="223" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:223,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://amzn.to/3Kw14fw&quot;,&quot;text&quot;:&quot;Get BlueSleuth-Lite&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://amzn.to/3Kw14fw"><span>Get BlueSleuth-Lite</span></a></p><div><hr></div><h1>&#9889;THREAT LANDSCAPE</h1><div><hr></div><p><strong>Fake CAPTCHA scam leads to costly phone bills</strong></p><p>Researchers have uncovered a scam that uses fake CAPTCHA pages to trick mobile users into sending international SMS messages, leading to unexpected charges. This scam, known as International Revenue Share Fraud, exploits telecom billing systems to generate revenue for cybercriminals. Users should avoid sending SMS to verify CAPTCHAs, regularly check their phone bills for unusual charges, and consider using mobile protection apps to block malicious sites.<a href="https://www.cybermaterial.com/p/fake-captcha-scam-leads-to-costly"> Read More</a></p><p><strong>Sandworm Uses SSH-over-Tor Tunnel</strong></p><p>The state-sponsored threat group Sandworm, also known as FROZENBARENTS, has been found using SSH-over-Tor tunneling to maintain covert access to targeted networks. This technique is part of their ongoing efforts to infiltrate government bodies, energy firms, and research institutions for intelligence gathering. Organizations should enhance their network monitoring and implement robust security measures to detect and prevent such sophisticated intrusions. <a href="https://www.cybermaterial.com/p/sandworm-uses-ssh-over-tor-tunnel">Read More</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!llmP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.youtube.com/@cybermaterial&quot;,&quot;text&quot;:&quot;Subscribe Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.youtube.com/@cybermaterial"><span>Subscribe Now</span></a></p><div><hr></div><h1><strong>&#128680;INCIDENTS &amp; REAL-WORLD IMPACT</strong></h1><div><hr></div><p><strong>Itron discloses security breach</strong></p><p>Itron, a U.S.-based company specializing in smart solutions for energy and water infrastructure, experienced unauthorized access to its IT systems on April 13, 2026. The breach did not affect customer-hosted systems, and Itron has engaged cybersecurity experts and law enforcement to investigate and contain the incident. Operations continue largely unaffected, and the company is assessing the need for further legal and regulatory actions while insurance is expected to cover much of the incident&#8217;s costs. <a href="https://www.cybermaterial.com/p/itron-discloses-security-breach">Read More</a></p><p><strong>Medtronic Confirms Data Breach</strong></p><p>Medtronic, a leading medical technology company, confirmed a data breach on April 24, where an unauthorized party accessed its corporate IT systems. The breach did not affect Medtronic&#8217;s product safety, customer connections, or manufacturing and distribution operations, and there was no impact on patient safety or hospital networks. Medtronic has taken steps to contain the breach, is investigating the incident with cybersecurity experts, and is committed to enhancing its cybersecurity measures. <a href="https://www.cybermaterial.com/p/medtronic-confirms-data-breach">Read More</a></p><p><strong>Chinese Engineer Stole US Military Software</strong></p><p>A Chinese aerospace engineer named Song Wu impersonated US researchers and engineers to obtain sensitive military software from NASA, the US military, and universities over four years. This breach involved the unauthorized sharing of aerospace engineering and computational fluid dynamics software, which is crucial for developing advanced weapons and is protected under US export controls. Organizations should enhance their cybersecurity measures, particularly against social engineering attacks, and ensure employees are trained to recognize and report suspicious requests for information. <a href="https://www.cybermaterial.com/p/chinese-engineer-stole-us-military">Read More</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MGQE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><h1><strong>&#128275; EXECUTIVE RISK &amp; CYBERNOMICS</strong></h1><div><hr></div><p><strong>Proofpoint AI Incident Report 2026</strong></p><p>Proofpoint&#8217;s 2026 AI and Human Risk Landscape report reveals that over half of organizations lack confidence in their AI security controls to detect compromised AI systems. The study, which surveyed over 1,400 security professionals globally, highlights that while AI adoption is widespread, many organizations struggle with security readiness and incident investigation across multiple systems. Organizations are advised to consolidate security tools and enhance AI protections to better manage the risks associated with AI deployment.<a href="https://www.cybermaterial.com/p/proofpoint-ai-incident-report-2026"> Read More</a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f7lS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" width="1456" height="349" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:349,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69329,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195026538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/services/&quot;,&quot;text&quot;:&quot;Get Help&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/services/"><span>Get Help</span></a></p><div><hr></div><h2><strong>&#128737;&#65039; POLICY, REGULATION &amp; LEGAL SIGNALS</strong></h2><div><hr></div><h4><strong>DORA and Operational Resilience</strong></h4><p>The EU&#8217;s Digital Operational Resilience Act (DORA), effective since January 2025, mandates financial services firms to systematically manage IT risk, test resilience under realistic conditions, and govern third-party dependencies. Despite progress, many organizations still struggle to meet these requirements, particularly in maintaining control during incidents when access is compromised. To comply with DORA, firms should implement independent management access to critical infrastructure, ensuring operational control even when primary networks are disrupted. <a href="https://www.cybermaterial.com/p/dora-and-operational-resilience">Read More</a></p><p><strong>U.S. Companies Face Record Privacy Fines in 2025</strong></p><p>In 2025, U.S. states imposed $3.45 billion in fines on companies for privacy violations, surpassing the total from the previous five years combined. This surge in penalties is attributed to stronger state privacy laws, enhanced interstate enforcement collaborations, and increased scrutiny on AI&#8217;s impact on privacy. Companies are advised to strengthen their privacy programs to comply with evolving regulations and avoid substantial fines.<a href="https://www.cybermaterial.com/p/us-companies-face-record-privacy"> Read More</a></p><div><hr></div><h2><strong>&#128187; CAREER ENABLEMENT</strong></h2><div><hr></div><p><strong>Cybersecurity Professionals Feel Undervalued</strong></p><p>A recent report reveals that over three-quarters of cybersecurity professionals did not receive a pay raise last year, leading to feelings of being undervalued and prompting many to consider changing jobs. Despite significant cybersecurity incidents, only 22% of organizations have increased their investment in cybersecurity, leaving many professionals pessimistic about future pay increases. To retain talent and reduce risk, companies should ensure cybersecurity staff feel valued and supported. <a href="https://www.cybermaterial.com/p/cybersecurity-professionals-feel">Read More</a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HL0l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><a href="https://www.cybermaterial.com/s/documents">Click Here To Read</a></p><div><hr></div><p>Copyright &#169; 2026 <a href="http://cybermaterial.com/">CyberMaterial</a>. All Rights Reserved.</p><p style="text-align: justify;">Follow CyberMaterial on:</p><p style="text-align: justify;"><a href="https://www.cybermaterial.com/">Substack</a>,<a href="https://www.linkedin.com/company/cybermaterial/"> LinkedIn</a>,<a href="https://twitter.com/cybermaterial_"> Twitter</a>,<a href="https://www.reddit.com/r/cybermaterial/"> Reddit</a>,<a href="https://instagram.com/Cybermat3rial"> Instagram</a>,<a href="https://www.facebook.com/cybermaterial"> Facebook</a>,<a href="https://www.youtube.com/@cybermaterial"> YouTube</a>, and<a href="https://cybermaterial.medium.com/"> Medium</a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Cyber Briefing: 2026.04.27]]></title><description><![CDATA[The current threat landscape is defined by sophisticated social engineering, such as Vidar infostealer&#8217;s use of fake CAPTCHAs....]]></description><link>https://www.cybermaterial.com/p/cyber-briefing-20260427</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cyber-briefing-20260427</guid><dc:creator><![CDATA[CyberMaterial]]></dc:creator><pubDate>Mon, 27 Apr 2026 14:01:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!74A6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac082db-ce2b-4e17-a170-35167d1decef_700x394.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!74A6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac082db-ce2b-4e17-a170-35167d1decef_700x394.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!74A6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac082db-ce2b-4e17-a170-35167d1decef_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!74A6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac082db-ce2b-4e17-a170-35167d1decef_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!74A6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac082db-ce2b-4e17-a170-35167d1decef_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!74A6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac082db-ce2b-4e17-a170-35167d1decef_700x394.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!74A6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac082db-ce2b-4e17-a170-35167d1decef_700x394.png" width="700" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2ac082db-ce2b-4e17-a170-35167d1decef_700x394.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:205658,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195622899?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac082db-ce2b-4e17-a170-35167d1decef_700x394.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!74A6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac082db-ce2b-4e17-a170-35167d1decef_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!74A6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac082db-ce2b-4e17-a170-35167d1decef_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!74A6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac082db-ce2b-4e17-a170-35167d1decef_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!74A6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ac082db-ce2b-4e17-a170-35167d1decef_700x394.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Welcome to Cyber Briefing, your daily source for all things cybersecurity. We bring you the latest advisories, alerts, incidents, and news every weekday.</p><p style="text-align: justify;">The current threat landscape is defined by sophisticated social engineering, such as <strong>Vidar infostealer&#8217;s</strong> use of fake CAPTCHAs, and critical Linux vulnerabilities like <strong>Pack2TheRoot</strong>, while major service disruptions have hit both <strong>Outlook.com</strong> and <strong>eBay</strong>, the latter suffering a massive DDoS attack.</p><p style="text-align: justify;">In the corporate and policy spheres, <strong>Alphabet&#8217;s $40 billion play for Anthropic</strong> signals massive AI consolidation, even as <strong>CISA</strong> faces leadership instability following Sean Plankey&#8217;s withdrawal and <strong>Belgium</strong> formalizes a new national cyber crisis response plan. Amidst these challenges, the sector continues to evolve through specialized talent pipelines, highlighted by <strong>Aspiritech&#8217;s</strong> new apprenticeship program for neurodivergent professionals.</p><p>Listen to our podcast here &#9196;</p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8a426b057dd2e0c473f0f32288&quot;,&quot;title&quot;:&quot;April 27, 2026 - Cyber Briefing&quot;,&quot;subtitle&quot;:&quot;CyberMaterial&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/7fxD8OCf4oO3lMlwV5SY1e&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/7fxD8OCf4oO3lMlwV5SY1e" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zkJR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" width="1456" height="223" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:223,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://amzn.to/3Kw14fw&quot;,&quot;text&quot;:&quot;Get BlueSleuth-Lite&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://amzn.to/3Kw14fw"><span>Get BlueSleuth-Lite</span></a></p><div><hr></div><h1>&#9889;THREAT LANDSCAPE</h1><div><hr></div><p><strong>Vidar Infostealer Spreads via Fake CAPTCHAs</strong></p><p>A new version of the Vidar infostealer malware is spreading through fake CAPTCHA challenges, targeting users by hiding in JPEG and TXT files. This malware employs fileless attack techniques to steal sensitive information such as browser data and cryptocurrency wallet details. Users should be cautious of unexpected CAPTCHA prompts and ensure their security software is up to date to detect and prevent such threats. Read More</p><p><strong>Pack2TheRoot Linux Vulnerability</strong></p><p>A vulnerability known as &#8216;Pack2TheRoot&#8217; has been identified in PackageKit, a package management system used in Linux. This flaw allows unprivileged users to gain root access by exploiting a race condition during package installation. Users and administrators should update their systems to the latest version of PackageKit to mitigate this risk. <strong><a href="https://www.cybermaterial.com/p/vidar-infostealer-spreads-via-fake">Read More</a></strong></p><p><strong>Phishing Campaign Targeting Robinhood Users</strong></p><p>A phishing campaign is targeting Robinhood users by sending emails that appear to be from the company, as warned by Ripple&#8217;s former CTO David Schwartz. These emails are designed to deceive recipients into believing they are legitimate, potentially leading to the compromise of personal information. Users should be cautious of unexpected emails from Robinhood and verify their authenticity before responding or clicking on any links. <strong><a href="https://www.cybermaterial.com/p/phishing-campaign-targeting-robinhood">Read More</a></strong></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!llmP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.youtube.com/@cybermaterial&quot;,&quot;text&quot;:&quot;Subscribe Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.youtube.com/@cybermaterial"><span>Subscribe Now</span></a></p><div><hr></div><h1><strong>&#128680;INCIDENTS &amp; REAL-WORLD IMPACT</strong></h1><div><hr></div><p><strong> Microsoft Outlook.com Access Issues</strong></p><p>Microsoft has reported a service degradation affecting Outlook.com, causing users across multiple regions to experience issues such as intermittent access failures, delayed email delivery, and inability to load the webmail interface. This incident is part of ongoing Microsoft 365 service instability, with a fix expected to be fully deployed by April 28, 2026. Affected users are advised to follow temporary workarounds provided by Microsoft and monitor the service health dashboard for updates. <strong><a href="https://www.cybermaterial.com/p/microsoft-outlookcom-access-issues">Read More</a></strong></p><p><strong>eBay Faces Widespread Outage Due to DDoS Attack</strong></p><p>eBay experienced a significant outage starting on April 26, 2026, affecting users worldwide who faced issues with essential site functions like search and checkout. The disruption, suspected to be caused by a denial-of-service attack allegedly claimed by the hacktivist group 313 Team, left buyers and sellers unable to complete transactions or access critical tools. Users are advised to monitor eBay&#8217;s official channels for updates and consider alternative platforms for urgent transactions until services are fully restored. <strong><a href="https://www.cybermaterial.com/p/ebay-faces-widespread-outage-due">Read More</a></strong></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MGQE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><h1><strong>&#128275; EXECUTIVE RISK &amp; CYBERNOMICS</strong></h1><div><hr></div><p><strong>Google plans $40bn investment in Anthropic</strong></p><p>Google&#8217;s parent company, Alphabet, plans to invest up to $40 billion in AI company Anthropic, with an initial $10 billion cash commitment and the remaining $30 billion contingent on performance criteria. This follows Amazon&#8217;s announcement of a similar investment plan, highlighting significant activity in the AI sector as companies seek to enhance their capabilities. Businesses should monitor these developments as they could impact the competitive landscape in AI technology and cloud services. <a href="https://www.cybermaterial.com/p/google-plans-40bn-investment-in-anthropic">Read More</a></p><p><strong>CISA Director Nominee Withdraws</strong></p><p>Sean Plankey, current administration&#8217;s nominee to lead the Cybersecurity and Infrastructure Security Agency (CISA), has withdrawn his candidacy after a prolonged and stalled nomination process in the Senate. Plankey cited the Senate&#8217;s lack of confirmation as the reason for his withdrawal, despite being renominated earlier this year. The withdrawal leaves CISA without a permanent leader as it faces challenges such as personnel cuts and mission downsizing. <a href="https://www.cybermaterial.com/p/cisa-director-nominee-withdraws">Read More</a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f7lS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" width="1456" height="349" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:349,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69329,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195026538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/services/&quot;,&quot;text&quot;:&quot;Get Help&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/services/"><span>Get Help</span></a></p><div><hr></div><h2><strong>&#128737;&#65039; POLICY, REGULATION &amp; LEGAL SIGNALS</strong></h2><div><hr></div><h4><strong>Belgium&#8217;s New Cyber Crisis Response Plan</strong></h4><p>Belgium has updated its national cyber crisis response plan, originally adopted in 2017, to align with current threats and European regulations. This revised plan, formalized by Royal Decree, provides a structured framework for managing cyber incidents, detailing roles, responsibilities, and procedures for both public and private stakeholders. Organizations in Belgium should familiarize themselves with this framework to ensure effective collaboration and preparedness in the event of a cyber crisis<strong>. <a href="https://www.cybermaterial.com/p/belgiums-new-cyber-crisis-response">Read More</a></strong></p><div><hr></div><h2><strong>&#128187; CAREER ENABLEMENT</strong></h2><div><hr></div><p><strong>Aspiritech Celebrates Cybersecurity Apprenticeship</strong></p><p>Aspiritech, a nonprofit based in Evanston, has launched a federally registered Cybersecurity Apprenticeship Program aimed at connecting adults on the autism spectrum with careers in high-demand tech fields. This initiative addresses the high unemployment rate among autistic individuals while meeting the growing demand for cybersecurity professionals. To participate or learn more, interested parties can attend an event at Aspiritech&#8217;s headquarters on April 30, which will include demonstrations and discussions with industry leaders. <strong><a href="https://www.cybermaterial.com/p/aspiritech-celebrates-cybersecurity">Read More</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HL0l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><a href="https://www.cybermaterial.com/s/documents">Click Here To Read</a></p><div><hr></div><p>Copyright &#169; 2026 <a href="http://cybermaterial.com/">CyberMaterial</a>. All Rights Reserved.</p><p style="text-align: justify;">Follow CyberMaterial on:</p><p style="text-align: justify;"><a href="https://www.cybermaterial.com/">Substack</a>,<a href="https://www.linkedin.com/company/cybermaterial/"> LinkedIn</a>,<a href="https://twitter.com/cybermaterial_"> Twitter</a>,<a href="https://www.reddit.com/r/cybermaterial/"> Reddit</a>,<a href="https://instagram.com/Cybermat3rial"> Instagram</a>,<a href="https://www.facebook.com/cybermaterial"> Facebook</a>,<a href="https://www.youtube.com/@cybermaterial"> YouTube</a>, and<a href="https://cybermaterial.medium.com/"> Medium</a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Cyber Briefing: 2026.04.24]]></title><description><![CDATA[The latest cyber threat landscape is marked by sophisticated session-stealing attacks targeting Telegram desktop users via PowerShell scripts and fraudulent CAPTCHA pages used...]]></description><link>https://www.cybermaterial.com/p/cyber-briefing-20260424</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cyber-briefing-20260424</guid><dc:creator><![CDATA[CyberMaterial]]></dc:creator><pubDate>Fri, 24 Apr 2026 14:03:22 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!q0Zf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ad9780b-97e2-4f0d-9132-ce4f18cb8b9f_700x394.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!q0Zf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ad9780b-97e2-4f0d-9132-ce4f18cb8b9f_700x394.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!q0Zf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ad9780b-97e2-4f0d-9132-ce4f18cb8b9f_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!q0Zf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ad9780b-97e2-4f0d-9132-ce4f18cb8b9f_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!q0Zf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ad9780b-97e2-4f0d-9132-ce4f18cb8b9f_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!q0Zf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ad9780b-97e2-4f0d-9132-ce4f18cb8b9f_700x394.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!q0Zf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ad9780b-97e2-4f0d-9132-ce4f18cb8b9f_700x394.png" width="700" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9ad9780b-97e2-4f0d-9132-ce4f18cb8b9f_700x394.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:94622,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195344797?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ad9780b-97e2-4f0d-9132-ce4f18cb8b9f_700x394.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!q0Zf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ad9780b-97e2-4f0d-9132-ce4f18cb8b9f_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!q0Zf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ad9780b-97e2-4f0d-9132-ce4f18cb8b9f_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!q0Zf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ad9780b-97e2-4f0d-9132-ce4f18cb8b9f_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!q0Zf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ad9780b-97e2-4f0d-9132-ce4f18cb8b9f_700x394.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Welcome to Cyber Briefing, your daily source for all things cybersecurity. We bring you the latest advisories, alerts, incidents, and news every weekday.</p><p style="text-align: justify;">The latest cyber threat landscape is marked by sophisticated session-stealing attacks targeting Telegram desktop users via PowerShell scripts and fraudulent CAPTCHA pages used to facilitate international SMS fraud.</p><p style="text-align: justify;">High-profile incidents include a data breach at UK Biobank involving the sale of de-identified research data and the rise of large-scale Chinese botnets using compromised edge devices for espionage. Amidst these threats, French authorities successfully arrested the notorious hacker &#8220;HexDex,&#8221; while the broader tech industry faces internal shifts as Meta and Microsoft implement thousands of job cuts to pivot their resources toward artificial intelligence.</p><p><em><strong>First time seeing this? Please <a href="https://cybermaterial.com/">Subscribe</a></strong></em></p><p>Listen to our podcast here &#9196;</p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8a426b057dd2e0c473f0f32288&quot;,&quot;title&quot;:&quot;April 24, 2026 - Cyber Briefing&quot;,&quot;subtitle&quot;:&quot;CyberMaterial&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/4fo81h7JwqaA72FPBDE8Ir&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/4fo81h7JwqaA72FPBDE8Ir" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zkJR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" width="1456" height="223" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:223,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://amzn.to/3Kw14fw&quot;,&quot;text&quot;:&quot;Get BlueSleuth-Lite&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://amzn.to/3Kw14fw"><span>Get BlueSleuth-Lite</span></a></p><div><hr></div><h1>&#9889;THREAT LANDSCAPE</h1><div><hr></div><p><strong>Hackers Exploit PowerShell Script for Telegram Hijack</strong></p><p>Hackers have developed a new session-stealing tool targeting Telegram&#8217;s desktop client by using a PowerShell script hosted on Pastebin. This script masquerades as a Windows telemetry update and does not aim to steal passwords or browser credentials, focusing solely on Telegram session data. Users of Telegram&#8217;s desktop client should be cautious of unexpected updates and verify the source of any scripts before execution. <a href="https://www.cybermaterial.com/p/hackers-exploit-powershell-script">Read More.</a></p><p><strong>Fake CAPTCHA Scam Triggers SMS Fraud</strong></p><p>Cybercriminals are exploiting fake CAPTCHA pages to conduct an international SMS fraud scheme, deceiving users into unwittingly participating in international revenue share fraud. Victims are directed to these fraudulent CAPTCHA pages through lookalike and scam domains, which are part of a traffic distribution system. To protect themselves, users should be cautious of unfamiliar CAPTCHA requests and verify the legitimacy of websites before entering any information. <a href="https://www.cybermaterial.com/p/fake-captcha-scam-triggers-sms-fraud">Read More</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!llmP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.youtube.com/@cybermaterial&quot;,&quot;text&quot;:&quot;Subscribe Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.youtube.com/@cybermaterial"><span>Subscribe Now</span></a></p><div><hr></div><h1><strong>&#128680;INCIDENTS &amp; REAL-WORLD IMPACT</strong></h1><div><hr></div><p><strong> UK Biobank Data Breach Raises Concerns</strong></p><p>The UK Biobank, a major biomedical research resource, experienced a data breach where de-identified participant data was listed for sale on a Chinese website. Although the data did not include personal identifiers like names or addresses, the breach violated data access agreements with academic institutions. In response, UK Biobank has suspended access to its research platform and is implementing stricter security measures to prevent future incidents. <a href="https://www.cybermaterial.com/p/uk-biobank-data-breach-raises-concerns">Read More</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MGQE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><h1><strong>&#128275; EXECUTIVE RISK &amp; CYBERNOMICS</strong></h1><div><hr></div><p><strong>Chinese Cyber Espionage via Compromised Devices</strong></p><p>China-linked cyber threat actors are now using large-scale covert networks and botnets made from compromised routers and edge devices, according to the National Cyber Security Centre (NCSC). This shift from individually procured infrastructure poses a threat to organizations of all sizes, particularly through VPN and remote access connections. Organizations are advised to map and baseline traffic from these devices to mitigate the risk. <a href="https://www.cybermaterial.com/p/chinese-cyber-espionage-via-compromised">Read More</a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f7lS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" width="1456" height="349" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:349,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69329,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195026538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/services/&quot;,&quot;text&quot;:&quot;Get Help&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/services/"><span>Get Help</span></a></p><div><hr></div><h2><strong>&#128737;&#65039; POLICY, REGULATION &amp; LEGAL SIGNALS</strong></h2><div><hr></div><h4><strong>French Police Arrest HexDex Hacker</strong></h4><p>French police have arrested a 20-year-old hacker known as HexDex, suspected of stealing data from numerous organizations, including sports federations and government offices, and posting it online. The investigation began in December 2025 after nearly 100 reports of data theft, and the suspect was apprehended just before leaking more data. Affected parties should review their security measures and monitor for any unauthorized data access or leaks. <strong><a href="https://www.cybermaterial.com/p/french-police-arrest-hexdex-hacker">Read More</a></strong></p><div><hr></div><h2><strong>&#128187; CAREER ENABLEMENT</strong></h2><div><hr></div><p><strong>Job Cuts at Meta and Microsoft</strong></p><p>Meta and Microsoft have announced significant job cuts as they shift focus towards artificial intelligence investments. Meta plans to cut around 8,000 jobs and leave 6,000 positions unfilled, while Microsoft is offering voluntary redundancies to about 8,750 employees. Affected employees should prepare for potential job transitions and stay informed about upcoming company updates. <strong><a href="https://www.cybermaterial.com/p/job-cuts-at-meta-and-microsoft">Read More</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HL0l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><a href="https://www.cybermaterial.com/s/documents">Click Here To Read</a></p><div><hr></div><p>Copyright &#169; 2026 <a href="http://cybermaterial.com/">CyberMaterial</a>. All Rights Reserved.</p><p style="text-align: justify;">Follow CyberMaterial on:</p><p style="text-align: justify;"><a href="https://www.cybermaterial.com/">Substack</a>,<a href="https://www.linkedin.com/company/cybermaterial/"> LinkedIn</a>,<a href="https://twitter.com/cybermaterial_"> Twitter</a>,<a href="https://www.reddit.com/r/cybermaterial/"> Reddit</a>,<a href="https://instagram.com/Cybermat3rial"> Instagram</a>,<a href="https://www.facebook.com/cybermaterial"> Facebook</a>,<a href="https://www.youtube.com/@cybermaterial"> YouTube</a>, and<a href="https://cybermaterial.medium.com/"> Medium</a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Cyber Briefing: 2026.04.23]]></title><description><![CDATA[The current cybersecurity landscape is marked by sophisticated shifts in attack vectors, including indirect prompt injection against AI assistants and the use of custom exfiltration tools...]]></description><link>https://www.cybermaterial.com/p/cyber-briefing-20260423</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cyber-briefing-20260423</guid><dc:creator><![CDATA[CyberMaterial]]></dc:creator><pubDate>Thu, 23 Apr 2026 14:46:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!NyKA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F217fde9b-fc0f-4bd8-b0b5-68936241175c_700x394.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NyKA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F217fde9b-fc0f-4bd8-b0b5-68936241175c_700x394.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NyKA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F217fde9b-fc0f-4bd8-b0b5-68936241175c_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!NyKA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F217fde9b-fc0f-4bd8-b0b5-68936241175c_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!NyKA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F217fde9b-fc0f-4bd8-b0b5-68936241175c_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!NyKA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F217fde9b-fc0f-4bd8-b0b5-68936241175c_700x394.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NyKA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F217fde9b-fc0f-4bd8-b0b5-68936241175c_700x394.png" width="700" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/217fde9b-fc0f-4bd8-b0b5-68936241175c_700x394.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:181435,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195234356?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F217fde9b-fc0f-4bd8-b0b5-68936241175c_700x394.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NyKA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F217fde9b-fc0f-4bd8-b0b5-68936241175c_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!NyKA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F217fde9b-fc0f-4bd8-b0b5-68936241175c_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!NyKA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F217fde9b-fc0f-4bd8-b0b5-68936241175c_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!NyKA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F217fde9b-fc0f-4bd8-b0b5-68936241175c_700x394.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Welcome to Cyber Briefing, your daily source for all things cybersecurity. We bring you the latest advisories, alerts, incidents, and news every weekday.</p><p style="text-align: justify;">The current cybersecurity landscape is marked by sophisticated shifts in attack vectors, including <strong>indirect prompt injection</strong> against AI assistants and the use of <strong>custom exfiltration tools</strong> by groups like Trigona to bypass traditional defenses. Real-world consequences are evident in high-profile data breaches at <strong>Rituals</strong> and supply chain compromises within <strong>Checkmarx</strong> tools, while the education sector faces a massive <strong>63% surge</strong> in attacks targeting research data.</p><p style="text-align: justify;">Legal and technical remediations are also evolving, as seen in <strong>Apple&#8217;s patch</strong> for Signal message vulnerabilities and a <strong>UK court ruling</strong> validating police use of live facial recognition. In response to these escalating risks, academic institutions like <strong>EWU</strong> are expanding specialized programs to bridge the critical talent gap in the cyber workforce.</p><p><em><strong>First time seeing this? Please <a href="https://cybermaterial.com/">Subscribe</a></strong></em></p><p>Listen to our podcast here &#9196;</p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8a426b057dd2e0c473f0f32288&quot;,&quot;title&quot;:&quot;April 23, 2026 - Cyber Briefing&quot;,&quot;subtitle&quot;:&quot;CyberMaterial&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/6D3B0TveoLYaiomx5nuzEf&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/6D3B0TveoLYaiomx5nuzEf" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zkJR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" width="1456" height="223" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:223,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://amzn.to/3Kw14fw&quot;,&quot;text&quot;:&quot;Get BlueSleuth-Lite&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://amzn.to/3Kw14fw"><span>Get BlueSleuth-Lite</span></a></p><div><hr></div><h1>&#9889;THREAT LANDSCAPE</h1><div><hr></div><p><strong>New Attacks on AI Assistants</strong></p><p>Cybersecurity researchers have discovered new attacks targeting AI assistants such as GitHub Copilot through indirect prompt injection. These attacks exploit hidden website code to manipulate the AI&#8217;s behavior. Users and developers should be vigilant about the websites they interact with and consider implementing security measures to protect AI systems from such vulnerabilities. <strong><a href="https://www.cybermaterial.com/p/new-attacks-on-ai-assistants">Read More</a></strong></p><p><strong>Trigona Ransomware Uses Custom Exfiltration Tool</strong></p><p>The Trigona ransomware group has shifted tactics by using a custom-developed tool for data exfiltration instead of widely available utilities. This new tool, called uploader_client.exe, allows attackers to efficiently steal high-value data while evading detection. Organizations should enhance their security measures by monitoring for unusual network activity and updating their defenses against custom malware tools. <strong><a href="https://www.cybermaterial.com/p/trigona-ransomware-uses-custom-exfiltration">Read More</a></strong></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!llmP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.youtube.com/@cybermaterial&quot;,&quot;text&quot;:&quot;Subscribe Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.youtube.com/@cybermaterial"><span>Subscribe Now</span></a></p><div><hr></div><h1><strong>&#128680;INCIDENTS &amp; REAL-WORLD IMPACT</strong></h1><div><hr></div><p><strong> Rituals Discloses Data Breach</strong></p><p>Luxury cosmetics company Rituals has disclosed a data breach affecting its My Rituals members. Hackers accessed and downloaded customer data, including names and addresses. Affected individuals are being notified, and they should monitor their accounts for any suspicious activity. <strong><a href="https://www.cybermaterial.com/p/rituals-discloses-data-breach">Read More</a></strong></p><p><strong>Checkmarx Supply Chain Security Incident</strong></p><p>Checkmarx has identified a supply chain security incident involving malicious artifacts in several of its products, including DockerHub KICS images and GitHub actions. Customers using versions or SHAs published before the affected timeframes are not impacted, but those using specific versions and tags should take immediate action. Recommended steps include blocking certain domains, using pinned SHAs, reviewing auto-update settings, and rotating credentials if a compromise is suspected. <strong><a href="https://www.cybermaterial.com/p/checkmarx-supply-chain-security-incident">Read More</a></strong></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MGQE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><h1><strong>&#128275; EXECUTIVE RISK &amp; CYBERNOMICS</strong></h1><div><hr></div><p><strong>Cyber-Attacks Surge 63% in Education Sector</strong></p><p>Educational institutions worldwide have seen a 63% rise in cyber-attacks, driven by geopolitical tensions, ransomware, and hacktivism, according to Quorum Cyber&#8217;s report. The report highlights significant increases in data breaches, hacktivist activities, and ransomware incidents, with universities particularly targeted for their valuable research. To mitigate these threats, institutions are advised to implement intelligence-led vulnerability management, dark web monitoring, robust backups, incident response exercises, and strong password management. <strong><a href="https://www.cybermaterial.com/p/cyber-attacks-surge-63-in-education">Read More</a></strong></p><p><strong>Apple fixes security flaw in Signal app</strong></p><p>Apple has addressed a security flaw that allowed the FBI to access deleted Signal messages through the iPhone&#8217;s push notification database. This vulnerability, which affected users of the Signal app, was highlighted in court documents related to an FBI investigation. Users should update their iOS devices to the latest version to ensure this issue is resolved and their data remains secure. <strong><a href="https://www.cybermaterial.com/p/apple-fixes-security-flaw-in-signal">Read More</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f7lS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" width="1456" height="349" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:349,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69329,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195026538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/services/&quot;,&quot;text&quot;:&quot;Get Help&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/services/"><span>Get Help</span></a></p><div><hr></div><h2><strong>&#128737;&#65039; POLICY, REGULATION &amp; LEGAL SIGNALS</strong></h2><div><hr></div><h4><strong>UK Court Upholds Facial Recognition Policy</strong></h4><p>The High Court of Justice in the UK has upheld the Metropolitan Police Service&#8217;s Live Facial Recognition Policy, dismissing a legal challenge that claimed the policy allowed excessive discretion in its deployment. The court found that the policy includes clear rules and safeguards, limiting its use to specific scenarios and ensuring oversight and proportionality assessments. Despite concerns about privacy and potential misuse, the ruling confirms the policy&#8217;s compliance with legal standards, influencing future use and regulation of surveillance technology in the UK.<strong> <a href="https://www.cybermaterial.com/p/uk-court-upholds-facial-recognition">Read More</a></strong></p><div><hr></div><h2><strong>&#128187; CAREER ENABLEMENT</strong></h2><div><hr></div><p><strong>Cybersecurity program expands at EWU</strong></p><p>Eastern Washington University (EWU) is expanding its cybersecurity program in response to the growing demand for skilled professionals in the field. The cybersecurity industry is rapidly growing due to increasing threats to critical infrastructure and the reliance on digital systems, yet there remains a significant gap between the number of available jobs and qualified workers. To address this, EWU is enhancing its curriculum and has been recognized as a National Center of Academic Excellence in Cyber Operations by the National Security Agency, aiming to equip students with the skills needed to tackle evolving cyber threats. <strong><a href="https://www.cybermaterial.com/p/cybersecurity-program-expands-at">Read More</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HL0l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><a href="https://www.cybermaterial.com/s/documents">Click Here To Read</a></p><div><hr></div><p>Copyright &#169; 2026 <a href="http://cybermaterial.com/">CyberMaterial</a>. All Rights Reserved.</p><p style="text-align: justify;">Follow CyberMaterial on:</p><p style="text-align: justify;"><a href="https://www.cybermaterial.com/">Substack</a>,<a href="https://www.linkedin.com/company/cybermaterial/"> LinkedIn</a>,<a href="https://twitter.com/cybermaterial_"> Twitter</a>,<a href="https://www.reddit.com/r/cybermaterial/"> Reddit</a>,<a href="https://instagram.com/Cybermat3rial"> Instagram</a>,<a href="https://www.facebook.com/cybermaterial"> Facebook</a>,<a href="https://www.youtube.com/@cybermaterial"> YouTube</a>, and<a href="https://cybermaterial.medium.com/"> Medium</a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Cyber Briefing: 2026.04.22]]></title><description><![CDATA[In today&#8217;s edition, the cybersecurity environment is characterized by high-sophistication attacks targeting decentralized finance (DeFi), software supply chains, and healthcare infrastructure.]]></description><link>https://www.cybermaterial.com/p/cyber-briefing-20260422</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cyber-briefing-20260422</guid><dc:creator><![CDATA[CyberMaterial]]></dc:creator><pubDate>Wed, 22 Apr 2026 14:02:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Yxql!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1939b8c5-bdc7-461b-9fa9-35491d3211b1_700x394.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Yxql!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1939b8c5-bdc7-461b-9fa9-35491d3211b1_700x394.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Yxql!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1939b8c5-bdc7-461b-9fa9-35491d3211b1_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!Yxql!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1939b8c5-bdc7-461b-9fa9-35491d3211b1_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!Yxql!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1939b8c5-bdc7-461b-9fa9-35491d3211b1_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!Yxql!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1939b8c5-bdc7-461b-9fa9-35491d3211b1_700x394.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Yxql!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1939b8c5-bdc7-461b-9fa9-35491d3211b1_700x394.png" width="700" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1939b8c5-bdc7-461b-9fa9-35491d3211b1_700x394.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:251469,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195026538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1939b8c5-bdc7-461b-9fa9-35491d3211b1_700x394.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Yxql!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1939b8c5-bdc7-461b-9fa9-35491d3211b1_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!Yxql!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1939b8c5-bdc7-461b-9fa9-35491d3211b1_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!Yxql!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1939b8c5-bdc7-461b-9fa9-35491d3211b1_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!Yxql!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1939b8c5-bdc7-461b-9fa9-35491d3211b1_700x394.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In today&#8217;s edition, the cybersecurity environment is characterized by high-sophistication attacks targeting decentralized finance (DeFi), software supply chains, and healthcare infrastructure. North Korean actors continue to lead aggressive campaigns, utilizing novel AppleScript and ClickFix methods against macOS systems and posing as fake IT workers to infiltrate cloud environments. Meanwhile, the discovery of <strong>CanisterWorm</strong> malware within Namastex npm packages and the evolution of the <strong>GoGra</strong> backdoor by the Harvester group highlight a persistent trend of exploiting developer ecosystems and covert command-and-control channels to bypass traditional defenses.</p><p style="text-align: justify;">Real-world impacts have hit the financial and medical sectors hard, evidenced by a <strong>$3.5 million</strong> exploit of Volo Protocol vaults and a significant ransomware attack on the Caribbean Medical Center, compromising nearly <strong>92,000</strong> patient records. Legal and regulatory responses are intensifying as authorities crack down on insider threats and infrastructure providers; notable developments include the guilty plea of a ransomware negotiator linked to the <strong>BlackCat</strong> group and a massive investigation into the <strong>ProxySmart</strong> SIM farm network. Additionally, major consumer platforms like Roblox are facing million-dollar settlements to enforce stricter child safety and age verification protocols amidst growing public and legal pressure</p><p><em><strong>First time seeing this? Please <a href="https://cybermaterial.com/">Subscribe</a></strong></em></p><p>Listen to our podcast here &#9196;</p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8a426b057dd2e0c473f0f32288&quot;,&quot;title&quot;:&quot;April 22, 2026 - Cyber Briefing&quot;,&quot;subtitle&quot;:&quot;CyberMaterial&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/34KwXFDR873hQbZlc79UZW&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/34KwXFDR873hQbZlc79UZW" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zkJR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" width="1456" height="223" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:223,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://amzn.to/3Kw14fw&quot;,&quot;text&quot;:&quot;Get BlueSleuth-Lite&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://amzn.to/3Kw14fw"><span>Get BlueSleuth-Lite</span></a></p><div><hr></div><h1>&#9889;THREAT LANDSCAPE</h1><div><hr></div><p><strong>North Korean Hackers Target Financial Organizations</strong></p><p>North Korean hackers are targeting financial organizations, including those involved with cryptocurrency, venture capital, and blockchain. They are using AppleScript and ClickFix in new attacks on macOS systems. Organizations in these sectors should enhance their security measures to protect against these threats. <strong><a href="https://www.cybermaterial.com/p/north-korean-hackers-target-financial">Read More</a></strong></p><p><strong>Harvester Expands Toolset with GoGra Backdoor</strong></p><p>The Harvester APT group has developed a new Linux version of its GoGra backdoor, which uses the Microsoft Graph API and Outlook mailboxes for covert command-and-control communication, bypassing traditional network defenses. This malware has been linked to a previous Windows espionage campaign by Harvester, with initial targets appearing to be in India and Afghanistan. Security professionals should monitor for indicators of compromise and update their defenses accordingly to mitigate potential threats from this evolving malware. <strong><a href="https://www.cybermaterial.com/p/harvester-expands-toolset-with-gogra">Read More</a></strong></p><p><strong>Namastex npm Packages Deliver Canister Worm Malware</strong></p><p>Malicious versions of npm packages from Namastex.ai have been found to contain CanisterWorm malware, which is a self-propagating backdoor linked to the threat actor TeamPCP. This malware replaces legitimate package contents with infected code, spreads across namespaces using stolen credentials, and exfiltrates sensitive data such as cloud credentials and SSH keys. Developers using these packages should immediately rotate their npm tokens and other credentials, audit package histories for suspicious changes, and enable script analysis to detect malicious postinstall hooks. <strong><a href="https://www.cybermaterial.com/p/namastex-npm-packages-deliver-canisterworm">Read More</a></strong></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!llmP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.youtube.com/@cybermaterial&quot;,&quot;text&quot;:&quot;Subscribe Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.youtube.com/@cybermaterial"><span>Subscribe Now</span></a></p><div><hr></div><h1><strong>&#128680;INCIDENTS &amp; REAL-WORLD IMPACT</strong></h1><div><hr></div><p><strong> Volo Protocol Hacked for $3.5M</strong></p><p>Volo Protocol, a decentralized finance platform, has suffered a security breach resulting in the loss of $3.5 million from select vaults. The affected assets include Wrapped Bitcoin, Matrixdock Gold, and USDC, but the protocol has assured that $28 million in other vaults remains secure. Volo has frozen the compromised assets and is working on fund recovery while planning to absorb the losses without impacting users. <strong><a href="https://www.cybermaterial.com/p/volo-protocol-hacked-for-35m">Read More</a></strong></p><p><strong>Ransomware Attack on Hospital Caribbean Medical Center</strong></p><p>A ransomware attack on Hospital Caribbean Medical Center in Puerto Rico has compromised the data of up to 92,000 individuals, with a group called The Gentlemen claiming responsibility. The breach involved sensitive patient information, and the hospital has since enhanced its security measures. Affected individuals should monitor their personal information and consider identity protection services. <strong><a href="https://www.cybermaterial.com/p/ransomware-attack-on-hospital-caribbean">Read More</a></strong></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MGQE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><h1><strong>&#128275; EXECUTIVE RISK &amp; CYBERNOMICS</strong></h1><div><hr></div><p><strong>Anker&#8217;s New AI Chip Announcement</strong></p><p> Anker has introduced a new AI chip called Thus, designed to enhance local AI capabilities in audio devices, mobile accessories, and IoT devices. The Thus processor is notable for being the first neural-net compute-in-memory AI audio chip, which is smaller and more power-efficient than traditional chips. This innovation is expected to benefit smaller devices by reducing the power needed for complex computations.<a href="https://www.cybermaterial.com/p/ankers-new-ai-chip-announcement"> </a><strong><a href="https://www.cybermaterial.com/p/ankers-new-ai-chip-announcement">Read More</a></strong></p><p><strong>Microsoft warns of fake IT worker identities</strong></p><p>Microsoft has issued a warning about the North Korean group Jasper Sleet, which is exploiting remote hiring practices to infiltrate cloud environments by posing as legitimate IT workers. This tactic takes advantage of the increased reliance on global remote hiring and online identity verification since the pandemic. Companies are advised to strengthen their identity verification processes and monitor access to cloud environments to prevent unauthorized access. <strong><a href="https://www.cybermaterial.com/p/microsoft-warns-of-fake-it-worker">Read More</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f7lS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" width="1456" height="349" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:349,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69329,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195026538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/services/&quot;,&quot;text&quot;:&quot;Get Help&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/services/"><span>Get Help</span></a></p><div><hr></div><h2><strong>&#128737;&#65039; POLICY, REGULATION &amp; LEGAL SIGNALS</strong></h2><div><hr></div><h3><strong>Massive SIM Farm Network Exposed</strong></h3><p>A global investigation has exposed a vast mobile proxy network called ProxySmart, which operates across 17 countries and involves 87 control panels and 94 phone-farm locations. This network facilitates large-scale fraud and identity evasion by using real smartphones and modems connected to carrier networks, making it difficult for anti-fraud systems to detect. Security professionals should be aware of this threat and consider enhancing their detection and prevention measures to address the challenges posed by such sophisticated proxy networks.<a href="https://www.cybermaterial.com/p/massive-sim-farm-network-exposed"> </a><strong><a href="https://www.cybermaterial.com/p/massive-sim-farm-network-exposed">Read More</a></strong></p><p><strong>Ransomware Negotiator Pleads Guilty</strong></p><p>Angelo Martino, a former ransomware negotiator, has pleaded guilty to collaborating with the BlackCat ransomware group to launch attacks against multiple US victims. Martino, who worked for Digital Mint, provided sensitive information to BlackCat and conspired with others to deploy ransomware, resulting in significant financial losses for various organizations. Authorities have seized $10 million in assets from Martino, and he faces up to 20 years in prison when sentenced on July 9. <strong><a href="https://www.cybermaterial.com/p/ransomware-negotiator-pleads-guilty">Read More</a></strong></p><p><strong>Roblox Settles with Alabama and West Virginia</strong></p><p>Roblox has reached settlements with Alabama and West Virginia over child safety concerns on its gaming platform, agreeing to pay $12.2 million and $11 million respectively. The settlements aim to enhance safety measures, including stricter age verification and expanded parental controls, to protect children from harmful content and interactions. Roblox will also fund safety initiatives and educational workshops in both states as part of the agreement. <strong><a href="https://www.cybermaterial.com/p/roblox-settles-with-alabama-and-west">Read More</a></strong></p><div><hr></div><h2><strong>&#128187; CAREER ENABLEMENT</strong></h2><div><hr></div><p><strong>1Nebula achieves ISO 27001 certification</strong></p><p>1Nebula has achieved ISO 27001 certification, indicating that the company has met international standards for information security management. This certification affects 1Nebula&#8217;s clients and partners, as it assures them of the company&#8217;s commitment to protecting sensitive information. Organizations working with 1Nebula can continue their partnerships with confidence, knowing that the company adheres to rigorous security protocols. <strong><a href="https://www.cybermaterial.com/p/1nebula-achieves-iso-27001-certification">Read More</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HL0l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><a href="https://www.cybermaterial.com/s/documents">Click Here To Read</a></p><div><hr></div><p>Copyright &#169; 2026 <a href="http://cybermaterial.com/">CyberMaterial</a>. All Rights Reserved.</p><p style="text-align: justify;">Follow CyberMaterial on:</p><p style="text-align: justify;"><a href="https://www.cybermaterial.com/">Substack</a>,<a href="https://www.linkedin.com/company/cybermaterial/"> LinkedIn</a>,<a href="https://twitter.com/cybermaterial_"> Twitter</a>,<a href="https://www.reddit.com/r/cybermaterial/"> Reddit</a>,<a href="https://instagram.com/Cybermat3rial"> Instagram</a>,<a href="https://www.facebook.com/cybermaterial"> Facebook</a>,<a href="https://www.youtube.com/@cybermaterial"> YouTube</a>, and<a href="https://cybermaterial.medium.com/"> Medium</a></p><div><hr></div>]]></content:encoded></item></channel></rss>