<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[CyberMaterial: Incidents]]></title><description><![CDATA[Find the latest cybersecurity incidents from data breaches, to ransomware attacks.]]></description><link>https://www.cybermaterial.com/s/incidents</link><image><url>https://substackcdn.com/image/fetch/$s_!nNgF!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6c57d21-5644-4f88-bf07-ea44d2603e80_482x482.png</url><title>CyberMaterial: Incidents</title><link>https://www.cybermaterial.com/s/incidents</link></image><generator>Substack</generator><lastBuildDate>Sun, 03 May 2026 22:23:10 GMT</lastBuildDate><atom:link href="https://www.cybermaterial.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[CyberMaterial]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[cybermaterial@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[cybermaterial@substack.com]]></itunes:email><itunes:name><![CDATA[CyberMaterial]]></itunes:name></itunes:owner><itunes:author><![CDATA[CyberMaterial]]></itunes:author><googleplay:owner><![CDATA[cybermaterial@substack.com]]></googleplay:owner><googleplay:email><![CDATA[cybermaterial@substack.com]]></googleplay:email><googleplay:author><![CDATA[CyberMaterial]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Ransom note appears on Naturalsciences.org]]></title><description><![CDATA[Naturalsciences.org experienced a cyberattack earlier today, as reported by DataBreaches.]]></description><link>https://www.cybermaterial.com/p/ransom-note-appears-on-naturalsciencesorg</link><guid isPermaLink="false">https://www.cybermaterial.com/p/ransom-note-appears-on-naturalsciencesorg</guid><pubDate>Fri, 01 May 2026 12:11:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!cQOJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b3baebe-8e0e-4096-8095-4bfdd5dbbc95_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cQOJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b3baebe-8e0e-4096-8095-4bfdd5dbbc95_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cQOJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b3baebe-8e0e-4096-8095-4bfdd5dbbc95_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!cQOJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b3baebe-8e0e-4096-8095-4bfdd5dbbc95_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!cQOJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b3baebe-8e0e-4096-8095-4bfdd5dbbc95_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!cQOJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b3baebe-8e0e-4096-8095-4bfdd5dbbc95_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cQOJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b3baebe-8e0e-4096-8095-4bfdd5dbbc95_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8b3baebe-8e0e-4096-8095-4bfdd5dbbc95_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:462947,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196105886?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b3baebe-8e0e-4096-8095-4bfdd5dbbc95_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cQOJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b3baebe-8e0e-4096-8095-4bfdd5dbbc95_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!cQOJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b3baebe-8e0e-4096-8095-4bfdd5dbbc95_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!cQOJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b3baebe-8e0e-4096-8095-4bfdd5dbbc95_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!cQOJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b3baebe-8e0e-4096-8095-4bfdd5dbbc95_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Naturalsciences.org experienced a cyberattack earlier today, as reported by DataBreaches. A ransom note was discovered on the website, prompting immediate concern and action from the site's administrators. Shortly after the ransom note was noticed, the website was taken offline, displaying a message that it was down for 'construction' rather than the usual 'maintenance' notice.<br><br>The incident has raised questions about the security measures in place at Naturalsciences.org and whether the organization has been able to address the breach effectively. As of the latest update, the website is partially back online, but it remains unclear if the ransom demand was met or if the attackers have been neutralized. This situation highlights the ongoing threat of ransomware attacks on organizations of all sizes.<br><br>Technical details about the attack, such as the method of infiltration or the specific demands made by the attackers, have not been disclosed. The use of a ransom note suggests a typical ransomware attack, where attackers encrypt data or threaten to release sensitive information unless a ransom is paid. The decision to take the site offline indicates a response strategy aimed at mitigating further damage.<br><br>The impact of this attack on Naturalsciences.org is still unfolding. The organization may face reputational damage, potential data loss, and financial implications depending on the outcome of the incident. Stakeholders and users of the site should remain vigilant for any further developments or notifications from the organization.<br><br>Organizations are advised to review their cybersecurity protocols and ensure they have robust defenses against ransomware attacks. Regular backups, employee training on phishing attacks, and maintaining updated security software are essential steps in protecting against such threats. Naturalsciences.org's experience serves as a reminder of the importance of preparedness in the face of cyber threats.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://databreaches.net/2026/04/30/to-recover-your-files-kindly-send-0-1-btc-to-ransom-note-appears-on-websites/?pk_campaign=feed&amp;pk_kwd=to-recover-your-files-kindly-send-0-1-btc-to-ransom-note-appears-on-websites</p>]]></content:encoded></item><item><title><![CDATA[Sandhills Medical Ransomware Breach]]></title><description><![CDATA[Sandhills Medical has recently disclosed a significant data breach that occurred nearly a year ago, affecting approximately 170,000 individuals.]]></description><link>https://www.cybermaterial.com/p/sandhills-medical-ransomware-breach</link><guid isPermaLink="false">https://www.cybermaterial.com/p/sandhills-medical-ransomware-breach</guid><pubDate>Thu, 30 Apr 2026 12:29:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!lOwY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b912dbd-da1d-4504-a6d4-3bb6841ef562_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lOwY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b912dbd-da1d-4504-a6d4-3bb6841ef562_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lOwY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b912dbd-da1d-4504-a6d4-3bb6841ef562_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!lOwY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b912dbd-da1d-4504-a6d4-3bb6841ef562_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!lOwY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b912dbd-da1d-4504-a6d4-3bb6841ef562_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!lOwY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b912dbd-da1d-4504-a6d4-3bb6841ef562_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lOwY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b912dbd-da1d-4504-a6d4-3bb6841ef562_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9b912dbd-da1d-4504-a6d4-3bb6841ef562_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:501238,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195991581?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b912dbd-da1d-4504-a6d4-3bb6841ef562_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lOwY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b912dbd-da1d-4504-a6d4-3bb6841ef562_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!lOwY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b912dbd-da1d-4504-a6d4-3bb6841ef562_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!lOwY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b912dbd-da1d-4504-a6d4-3bb6841ef562_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!lOwY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b912dbd-da1d-4504-a6d4-3bb6841ef562_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Sandhills Medical has recently disclosed a significant data breach that occurred nearly a year ago, affecting approximately 170,000 individuals. The breach was the result of a ransomware attack by the group known as Inc Ransom, which has been involved in several high-profile attacks on healthcare organizations.<br><br>The delay in disclosure has raised concerns about the timeliness of breach notifications, which are critical for affected individuals to take protective measures. The healthcare sector has been a frequent target for ransomware attacks, given the sensitive nature of the data they handle and the potential for disruption to critical services.<br><br>Technical details about the breach have not been fully disclosed, but it is known that the ransomware attack compromised sensitive personal and medical information. This could include names, addresses, medical records, and potentially financial information, depending on the data stored by Sandhills Medical.<br><br>The impact of this breach is significant, as it exposes individuals to risks such as identity theft and fraud. The healthcare organization may also face regulatory scrutiny and potential fines for the delay in reporting the breach, as well as reputational damage.<br><br>Affected individuals are advised to monitor their financial accounts and credit reports for any unusual activity. Additionally, they should consider enrolling in identity theft protection services to mitigate potential risks. Sandhills Medical is expected to provide further guidance and support to those impacted by the breach.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://www.securityweek.com/sandhills-medical-says-ransomware-breach-affects-170000/ </p>]]></content:encoded></item><item><title><![CDATA[Feuding Ransomware Groups Leak Each Other's Data]]></title><description><![CDATA[A recent feud between two ransomware groups, 0APT and KryBit, has led to the exposure of sensitive data from both parties.]]></description><link>https://www.cybermaterial.com/p/feuding-ransomware-groups-leak-each</link><guid isPermaLink="false">https://www.cybermaterial.com/p/feuding-ransomware-groups-leak-each</guid><pubDate>Thu, 30 Apr 2026 12:27:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!m_Lp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09beea5a-3c9e-4fdf-a247-1119d2b13651_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!m_Lp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09beea5a-3c9e-4fdf-a247-1119d2b13651_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!m_Lp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09beea5a-3c9e-4fdf-a247-1119d2b13651_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!m_Lp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09beea5a-3c9e-4fdf-a247-1119d2b13651_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!m_Lp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09beea5a-3c9e-4fdf-a247-1119d2b13651_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!m_Lp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09beea5a-3c9e-4fdf-a247-1119d2b13651_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!m_Lp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09beea5a-3c9e-4fdf-a247-1119d2b13651_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/09beea5a-3c9e-4fdf-a247-1119d2b13651_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:628265,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195991415?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09beea5a-3c9e-4fdf-a247-1119d2b13651_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!m_Lp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09beea5a-3c9e-4fdf-a247-1119d2b13651_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!m_Lp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09beea5a-3c9e-4fdf-a247-1119d2b13651_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!m_Lp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09beea5a-3c9e-4fdf-a247-1119d2b13651_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!m_Lp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09beea5a-3c9e-4fdf-a247-1119d2b13651_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>A recent feud between two ransomware groups, 0APT and KryBit, has led to the exposure of sensitive data from both parties. This unusual conflict between cybercriminals has provided a rare glimpse into their operations, potentially benefiting cybersecurity defenders. The Halcyon Ransomware Research Center has detailed this incident, highlighting the implications for both the attackers and those defending against them.<br><br>0APT, which emerged in January, initially gained attention by posting a list of nearly 200 supposed victims. However, this list was largely dismissed as fabricated due to a lack of evidence. In April, 0APT attempted to regain credibility by claiming attacks against other ransomware operators, including KryBit, Everest, and RansomHouse. Meanwhile, KryBit, which began operations in March, had established itself with legitimate ransomware-as-a-service offerings and a list of real victims.<br><br>The conflict escalated when 0APT published data allegedly belonging to Everest and RansomHouse, though the authenticity and impact of this data were questionable. In retaliation, KryBit exposed 0APT's infrastructure and personnel details, revealing the fabricated nature of 0APT's initial victim list. This exposure included operational data, access logs, and system files, effectively dismantling 0APT's credibility.<br><br>The fallout from this feud has left both groups in disarray, with KryBit maintaining defacement of 0APT's leak site. Such infighting among ransomware operators is not unprecedented, but the scale and public nature of this incident are notable. The exposure of tactics and infrastructure provides valuable intelligence for security professionals.<br><br>For defenders, the Halcyon Ransomware Research Center recommends vigilance against data staging and exfiltration, ensuring backup integrity, and deploying comprehensive anti-ransomware measures. While 0APT's victim list was fraudulent, KryBit and Everest remain legitimate threats, necessitating continued monitoring and preparedness against potential attacks.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://www.darkreading.com/threat-intelligence/feuding-ransomware-groups-leak-data </p>]]></content:encoded></item><item><title><![CDATA[Polymarket denies data breach claims]]></title><description><![CDATA[Polymarket, a platform known for its prediction markets, has recently been at the center of controversy following claims of a data breach.]]></description><link>https://www.cybermaterial.com/p/polymarket-denies-data-breach-claims</link><guid isPermaLink="false">https://www.cybermaterial.com/p/polymarket-denies-data-breach-claims</guid><pubDate>Wed, 29 Apr 2026 12:18:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!i5CU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fd78b2c-f619-41f1-926e-53973b1cd9f9_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!i5CU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fd78b2c-f619-41f1-926e-53973b1cd9f9_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!i5CU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fd78b2c-f619-41f1-926e-53973b1cd9f9_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!i5CU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fd78b2c-f619-41f1-926e-53973b1cd9f9_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!i5CU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fd78b2c-f619-41f1-926e-53973b1cd9f9_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!i5CU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fd78b2c-f619-41f1-926e-53973b1cd9f9_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!i5CU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fd78b2c-f619-41f1-926e-53973b1cd9f9_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1fd78b2c-f619-41f1-926e-53973b1cd9f9_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:58804,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195862883?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fd78b2c-f619-41f1-926e-53973b1cd9f9_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!i5CU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fd78b2c-f619-41f1-926e-53973b1cd9f9_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!i5CU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fd78b2c-f619-41f1-926e-53973b1cd9f9_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!i5CU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fd78b2c-f619-41f1-926e-53973b1cd9f9_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!i5CU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fd78b2c-f619-41f1-926e-53973b1cd9f9_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Polymarket, a platform known for its prediction markets, has recently been at the center of controversy following claims of a data breach. A hacker, identified by the pseudonym 'xorcat' on the dark web, alleged that they had accessed and stolen a significant amount of user data from Polymarket. This claim was shared across various cybersecurity channels, raising concerns among users and stakeholders of the platform.<br><br>The hacker's post on DarkForums suggested that over 300,000 records were compromised, including 10,000 unique user profiles. These profiles reportedly contained sensitive information such as full names, profile images, proxy wallets, and base addresses. Screenshots of the hacker's claims were circulated by Vecert Analyzer, a cybersecurity company, and other accounts that monitor dark web activities.<br><br>Despite these alarming claims, Polymarket has firmly denied any breach of its customer data. The company has not provided specific details on how they verified the security of their systems but has assured users that their data remains safe. This denial comes amidst heightened scrutiny and the potential risk of data exposure for users of the platform.<br><br>The impact of such claims, whether substantiated or not, can be significant for any online platform. Users may experience anxiety over the safety of their personal information, and the platform's reputation could suffer as a result. It is essential for companies like Polymarket to maintain transparency and communicate effectively with their users during such incidents.<br><br>Users of Polymarket are advised to remain vigilant and take proactive steps to secure their accounts. This includes monitoring for any unusual activity, updating passwords, and ensuring that all security settings are properly configured. Staying informed about the latest developments and following best practices for online security can help mitigate potential risks associated with such claims.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: </p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://x.com/VECERTRadar/status/2048892549473943738&quot;,&quot;full_text&quot;:&quot;&#128680; INTELLIGENCE ALERT: EXPLOIT KIT AND DATASET SALE &#8211; POLYMARKET &#127760;&#128200;&#128275;\n\nThreat actor xorcat has put up for sale a package containing a \&quot;Red Team\&quot; exploit kit and a structured dataset exfiltrated from Polymarket (<a class=\&quot;tweet-url\&quot; href=\&quot;http://polymarket.com\&quot;>polymarket.com</a>)&#8212;the world's largest decentralized &quot;,&quot;username&quot;:&quot;VECERTRadar&quot;,&quot;name&quot;:&quot;VECERT Analyzer&quot;,&quot;profile_image_url&quot;:&quot;https://pbs.substack.com/profile_images/2026138054063513600/TG7Qg3eE_normal.jpg&quot;,&quot;date&quot;:&quot;2026-04-27T22:30:25.000Z&quot;,&quot;photos&quot;:[{&quot;img_url&quot;:&quot;https://pbs.substack.com/media/HG8g3pnbAAAqCL5.png&quot;,&quot;link_url&quot;:&quot;https://t.co/PjsAEbziGq&quot;}],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:1,&quot;retweet_count&quot;:6,&quot;like_count&quot;:17,&quot;impression_count&quot;:5641,&quot;expanded_url&quot;:null,&quot;video_url&quot;:null,&quot;belowTheFold&quot;:false}" data-component-name="Twitter2ToDOM"></div>]]></content:encoded></item><item><title><![CDATA[Checkmarx Data Stolen in Supply Chain Attack]]></title><description><![CDATA[Checkmarx, a prominent provider of application security testing solutions, has confirmed a data breach resulting from a supply chain attack.]]></description><link>https://www.cybermaterial.com/p/checkmarx-data-stolen-in-supply-chain</link><guid isPermaLink="false">https://www.cybermaterial.com/p/checkmarx-data-stolen-in-supply-chain</guid><pubDate>Wed, 29 Apr 2026 12:15:33 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!1Iye!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44aab6a-1f62-445a-87bd-add6561a33c9_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1Iye!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44aab6a-1f62-445a-87bd-add6561a33c9_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1Iye!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44aab6a-1f62-445a-87bd-add6561a33c9_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!1Iye!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44aab6a-1f62-445a-87bd-add6561a33c9_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!1Iye!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44aab6a-1f62-445a-87bd-add6561a33c9_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!1Iye!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44aab6a-1f62-445a-87bd-add6561a33c9_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1Iye!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44aab6a-1f62-445a-87bd-add6561a33c9_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d44aab6a-1f62-445a-87bd-add6561a33c9_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:489724,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195862733?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44aab6a-1f62-445a-87bd-add6561a33c9_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1Iye!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44aab6a-1f62-445a-87bd-add6561a33c9_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!1Iye!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44aab6a-1f62-445a-87bd-add6561a33c9_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!1Iye!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44aab6a-1f62-445a-87bd-add6561a33c9_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!1Iye!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44aab6a-1f62-445a-87bd-add6561a33c9_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Checkmarx, a prominent provider of application security testing solutions, has confirmed a data breach resulting from a supply chain attack. The incident involved the exfiltration of data from Checkmarx's GitHub environment, which occurred on March 30. This breach highlights the ongoing risks associated with supply chain vulnerabilities, particularly in environments where code sharing and collaboration are integral to operations.<br><br>The attack unfolded shortly after hackers published malicious code, which suggests a well-planned operation aimed at compromising Checkmarx's systems. Supply chain attacks are increasingly common, as they allow attackers to infiltrate organizations indirectly by targeting third-party services or software dependencies. In this case, the attackers successfully accessed and extracted data from Checkmarx's GitHub repositories, which could have implications for the company's clients and partners.<br><br>Technical details about the specific data stolen or the methods used by the attackers have not been disclosed. However, the breach underscores the importance of securing code repositories and implementing robust access controls. Organizations must remain vigilant against such threats, as attackers continue to refine their techniques to exploit weaknesses in software supply chains.<br><br>The impact of this breach on Checkmarx's clients and partners is not yet fully understood. However, the potential exposure of sensitive data could lead to further security incidents if the information is used maliciously. Companies relying on Checkmarx's services should assess their own security postures and consider additional protective measures.<br><br>To mitigate risks, organizations should conduct thorough security audits of their supply chain dependencies and enhance monitoring for unusual activities. It is advisable to review access permissions and ensure that all code repositories are secured with multi-factor authentication and other advanced security protocols. Staying informed about potential threats and maintaining a proactive security strategy are essential steps in safeguarding against future supply chain attacks.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://checkmarx.com/blog/supply-chain-security-incident-update/</p>]]></content:encoded></item><item><title><![CDATA[Chinese Engineer Stole US Military Software]]></title><description><![CDATA[A Chinese aerospace engineer, Song Wu, has been implicated in a significant case of international espionage involving the theft of sensitive US military software.]]></description><link>https://www.cybermaterial.com/p/chinese-engineer-stole-us-military</link><guid isPermaLink="false">https://www.cybermaterial.com/p/chinese-engineer-stole-us-military</guid><pubDate>Tue, 28 Apr 2026 12:34:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!JXgp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb978473-108a-484f-8519-05ecd60faf98_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JXgp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb978473-108a-484f-8519-05ecd60faf98_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JXgp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb978473-108a-484f-8519-05ecd60faf98_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!JXgp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb978473-108a-484f-8519-05ecd60faf98_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!JXgp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb978473-108a-484f-8519-05ecd60faf98_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!JXgp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb978473-108a-484f-8519-05ecd60faf98_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JXgp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb978473-108a-484f-8519-05ecd60faf98_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bb978473-108a-484f-8519-05ecd60faf98_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:614567,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195743569?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb978473-108a-484f-8519-05ecd60faf98_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JXgp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb978473-108a-484f-8519-05ecd60faf98_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!JXgp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb978473-108a-484f-8519-05ecd60faf98_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!JXgp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb978473-108a-484f-8519-05ecd60faf98_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!JXgp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb978473-108a-484f-8519-05ecd60faf98_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A Chinese aerospace engineer, Song Wu, has been implicated in a significant case of international espionage involving the theft of sensitive US military software. Over a period of four years, Wu successfully impersonated US researchers and engineers to solicit proprietary software from NASA, the US military, and various universities. This breach highlights the ongoing threat of social engineering attacks and the need for heightened vigilance among organizations handling sensitive information.<br><br>Wu, who worked for the Aviation Industry Corporation of China (AVIC), a state-owned aerospace and defense conglomerate, used fake email accounts to impersonate real US researchers. From January 2017 to December 2021, he targeted individuals at NASA, the Air Force, Navy, Army, and the Federal Aviation Administration, as well as faculty members at US universities. By requesting source code and proprietary software, Wu managed to obtain intellectual property crucial for developing advanced tactical missiles and evaluating weapons performance, thereby violating US export control laws.<br><br>The breach was not detected by sophisticated cybersecurity measures but rather through a tip-off to NASA's Cyber Crimes Division. Investigators traced the campaign back to Wu after discovering a Gmail account impersonating an established aerospace professor. The investigation revealed that Wu's requests for software were repetitive and lacked justification, which should have been red flags for the recipients.<br><br>The implications of this breach are significant, as it underscores the vulnerability of sensitive information to social engineering attacks. The FBI has highlighted the scale of the threat posed by Chinese hackers, who reportedly outnumber US cyber personnel by a large margin. The use of deepfake technology and other advanced techniques is making impersonation attempts more convincing, posing a growing challenge for cybersecurity professionals.<br><br>To mitigate such threats, organizations must strengthen their cybersecurity protocols and provide comprehensive training to employees on recognizing and responding to social engineering attacks. It is essential to establish robust verification processes for requests involving sensitive information and to encourage a culture of vigilance and reporting within the workforce.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://www.malwarebytes.com/blog/news/2026/04/chinese-engineer-stole-us-military-and-nasa-software-for-years </p>]]></content:encoded></item><item><title><![CDATA[Medtronic Confirms Data Breach]]></title><description><![CDATA[Medtronic, a prominent figure in the medical technology industry, has disclosed a data breach involving its corporate IT systems.]]></description><link>https://www.cybermaterial.com/p/medtronic-confirms-data-breach</link><guid isPermaLink="false">https://www.cybermaterial.com/p/medtronic-confirms-data-breach</guid><pubDate>Tue, 28 Apr 2026 12:33:54 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!U9x3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3097eda9-7814-4cc3-9e36-0c9e12f297c2_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!U9x3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3097eda9-7814-4cc3-9e36-0c9e12f297c2_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!U9x3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3097eda9-7814-4cc3-9e36-0c9e12f297c2_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!U9x3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3097eda9-7814-4cc3-9e36-0c9e12f297c2_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!U9x3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3097eda9-7814-4cc3-9e36-0c9e12f297c2_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!U9x3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3097eda9-7814-4cc3-9e36-0c9e12f297c2_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!U9x3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3097eda9-7814-4cc3-9e36-0c9e12f297c2_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3097eda9-7814-4cc3-9e36-0c9e12f297c2_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:613330,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195743462?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3097eda9-7814-4cc3-9e36-0c9e12f297c2_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!U9x3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3097eda9-7814-4cc3-9e36-0c9e12f297c2_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!U9x3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3097eda9-7814-4cc3-9e36-0c9e12f297c2_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!U9x3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3097eda9-7814-4cc3-9e36-0c9e12f297c2_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!U9x3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3097eda9-7814-4cc3-9e36-0c9e12f297c2_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Medtronic, a prominent figure in the medical technology industry, has disclosed a data breach involving its corporate IT systems. The breach, identified on April 24, involved unauthorized access but is not expected to impact the company's financial performance or business operations. Medtronic has reassured stakeholders that immediate actions were taken to contain the situation and that critical operational areas remain unaffected.<br><br>The breach has raised concerns within the healthcare and medtech sectors, but Medtronic has clarified that there was no disruption to product safety, customer connections, or manufacturing and distribution activities. Importantly, patient safety and the company's ability to meet patient care commitments were not compromised. Medtronic emphasized that its corporate IT systems are separate from those used for products and operations, which were not impacted by the breach.<br><br>Following the breach's identification, Medtronic activated its incident response protocols and enlisted cybersecurity experts to investigate and implement remediation measures. The company is also working to determine if any personal information was accessed and has committed to notifying affected individuals if necessary. Medtronic is focused on enhancing its cybersecurity measures to prevent future incidents.<br><br>This incident at Medtronic is part of a broader trend of cybersecurity challenges facing the medtech industry. Similar incidents have affected other companies, such as Stryker and Intuitive Surgical, highlighting the increasing frequency and sophistication of cyberattacks in the sector. As digital transformation continues, medtech companies remain vulnerable to such threats.<br><br>Medtronic's response to the breach underscores the importance of robust cybersecurity measures in protecting sensitive information and maintaining operational integrity. The company is committed to optimizing its system security and ensuring that its stakeholders are informed and supported throughout the process.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://news.medtronic.com/Medtronic-statement-on-unauthorized-system-access </p>]]></content:encoded></item><item><title><![CDATA[Itron discloses security breach]]></title><description><![CDATA[Itron, a company known for its smart solutions in energy, water, and smart city infrastructure, has disclosed a security breach involving unauthorized access to its IT systems.]]></description><link>https://www.cybermaterial.com/p/itron-discloses-security-breach</link><guid isPermaLink="false">https://www.cybermaterial.com/p/itron-discloses-security-breach</guid><pubDate>Tue, 28 Apr 2026 12:31:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!e4sA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F717d109c-593d-4acd-8939-40e2a6926bfc_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!e4sA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F717d109c-593d-4acd-8939-40e2a6926bfc_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!e4sA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F717d109c-593d-4acd-8939-40e2a6926bfc_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!e4sA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F717d109c-593d-4acd-8939-40e2a6926bfc_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!e4sA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F717d109c-593d-4acd-8939-40e2a6926bfc_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!e4sA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F717d109c-593d-4acd-8939-40e2a6926bfc_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!e4sA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F717d109c-593d-4acd-8939-40e2a6926bfc_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/717d109c-593d-4acd-8939-40e2a6926bfc_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:512640,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195743232?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F717d109c-593d-4acd-8939-40e2a6926bfc_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!e4sA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F717d109c-593d-4acd-8939-40e2a6926bfc_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!e4sA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F717d109c-593d-4acd-8939-40e2a6926bfc_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!e4sA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F717d109c-593d-4acd-8939-40e2a6926bfc_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!e4sA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F717d109c-593d-4acd-8939-40e2a6926bfc_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Itron, a company known for its smart solutions in energy, water, and smart city infrastructure, has disclosed a security breach involving unauthorized access to its IT systems. The incident was detected on April 13, 2026, prompting the company to activate its incident response plan. Itron has engaged external cybersecurity experts and notified law enforcement to help investigate and contain the breach. Fortunately, the unauthorized access did not extend to the customer-hosted portion of its systems, which is critical given Itron's involvement with utility infrastructure.<br><br>The breach was reported in a FORM 8-K filing with the Securities and Exchange Commission (SEC), where Itron detailed its response efforts. The company has taken steps to remediate and remove the unauthorized activity and has not observed any further unauthorized access within its corporate systems. As of now, no ransomware group has claimed responsibility for the attack, and Itron continues to investigate the scope of the breach.<br><br>Itron, which employs approximately 4,987 people and reported $2.37 billion in revenue in 2025, provides utilities with data analytics, smart meters, and grid management technologies. Despite the breach, Itron's operations remain largely unaffected due to contingency plans and backups. The company expects insurance to cover much of the incident's costs, minimizing financial impact.<br><br>The company is currently evaluating the necessary legal filings and regulatory notifications required as a result of the incident. While the investigation is ongoing, Itron does not believe the breach will have a material impact on its operations. The ability to maintain operational continuity during such incidents is crucial for companies involved in critical infrastructure.<br><br>For organizations like Itron, ensuring that systems remain operational during an investigation is as important as addressing the breach itself. Itron's proactive measures and ongoing assessment demonstrate its commitment to safeguarding its systems and maintaining service continuity for its clients.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://securityaffairs.com/191360/data-breach/u-s-utility-giant-itron-discloses-a-security-breach.html</p>]]></content:encoded></item><item><title><![CDATA[eBay Faces Widespread Outage Due to DDoS Attack]]></title><description><![CDATA[eBay, a leading e-commerce platform, encountered a major service disruption beginning late Sunday, April 26, 2026, which extended into the following day.]]></description><link>https://www.cybermaterial.com/p/ebay-faces-widespread-outage-due</link><guid isPermaLink="false">https://www.cybermaterial.com/p/ebay-faces-widespread-outage-due</guid><pubDate>Mon, 27 Apr 2026 12:42:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ZPH6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb99a6d2d-9e6c-41ab-ad7c-64d713522510_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZPH6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb99a6d2d-9e6c-41ab-ad7c-64d713522510_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZPH6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb99a6d2d-9e6c-41ab-ad7c-64d713522510_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!ZPH6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb99a6d2d-9e6c-41ab-ad7c-64d713522510_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!ZPH6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb99a6d2d-9e6c-41ab-ad7c-64d713522510_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!ZPH6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb99a6d2d-9e6c-41ab-ad7c-64d713522510_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZPH6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb99a6d2d-9e6c-41ab-ad7c-64d713522510_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b99a6d2d-9e6c-41ab-ad7c-64d713522510_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:474744,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195622149?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb99a6d2d-9e6c-41ab-ad7c-64d713522510_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZPH6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb99a6d2d-9e6c-41ab-ad7c-64d713522510_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!ZPH6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb99a6d2d-9e6c-41ab-ad7c-64d713522510_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!ZPH6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb99a6d2d-9e6c-41ab-ad7c-64d713522510_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!ZPH6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb99a6d2d-9e6c-41ab-ad7c-64d713522510_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>eBay, a leading e-commerce platform, encountered a major service disruption beginning late Sunday, April 26, 2026, which extended into the following day. Users globally reported severe technical difficulties that impacted key functionalities of the site, including search, listings, and checkout processes. The outage has caused significant frustration among both buyers and sellers who rely on these features for their transactions.<br><br>The outage reportedly began affecting users on the afternoon of April 26, with a notable increase in complaints around 3:30 PM ET, according to Downdetector. By the evening, over 1,300 outage reports had been logged, highlighting the widespread nature of the disruption. Users experienced slow page loads and failed transactions, with many unable to complete purchases or access the API necessary for third-party sales management tools.<br><br>Unverified reports have surfaced suggesting that the hacktivist group 313 Team is behind a denial-of-service (DDoS) attack that may have caused the outage. DDoS attacks involve overwhelming a website with traffic to disrupt its services, a tactic commonly used by hacktivist groups. Although the group allegedly claimed responsibility on various forums, eBay has not confirmed these reports, and the company's official status page has not indicated a cyberattack.<br><br>The impact of the outage has been significant, with users expressing their frustrations on social media platforms. Many have reported ongoing issues well into the night, questioning the reliability of eBay and seeking answers from the company. Sellers, in particular, have voiced concerns about the financial implications of being unable to access the API, which is essential for managing their online businesses.<br><br>In response to the situation, users are advised to keep an eye on eBay's official communications for updates on the restoration of services. Those needing to complete urgent transactions may need to explore alternative e-commerce platforms temporarily. eBay's customer support channels have been largely silent, prompting users to seek information and share experiences on social media as they await a resolution.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://thecyberexpress.com/ebay-outage-april-2026-ddos-attack/ </p>]]></content:encoded></item><item><title><![CDATA[Microsoft Outlook.com Access Issues]]></title><description><![CDATA[Microsoft has acknowledged a service degradation affecting Outlook.com, with users experiencing difficulties accessing the platform since April 27, 2026.]]></description><link>https://www.cybermaterial.com/p/microsoft-outlookcom-access-issues</link><guid isPermaLink="false">https://www.cybermaterial.com/p/microsoft-outlookcom-access-issues</guid><pubDate>Mon, 27 Apr 2026 12:41:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!WNzd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F852b6636-59aa-49c5-b395-fada10f9157d_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WNzd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F852b6636-59aa-49c5-b395-fada10f9157d_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WNzd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F852b6636-59aa-49c5-b395-fada10f9157d_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!WNzd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F852b6636-59aa-49c5-b395-fada10f9157d_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!WNzd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F852b6636-59aa-49c5-b395-fada10f9157d_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!WNzd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F852b6636-59aa-49c5-b395-fada10f9157d_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WNzd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F852b6636-59aa-49c5-b395-fada10f9157d_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/852b6636-59aa-49c5-b395-fada10f9157d_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:646393,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195622020?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F852b6636-59aa-49c5-b395-fada10f9157d_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WNzd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F852b6636-59aa-49c5-b395-fada10f9157d_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!WNzd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F852b6636-59aa-49c5-b395-fada10f9157d_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!WNzd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F852b6636-59aa-49c5-b395-fada10f9157d_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!WNzd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F852b6636-59aa-49c5-b395-fada10f9157d_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"></div></div></a></figure></div><p></p><p>Microsoft has acknowledged a service degradation affecting Outlook.com, with users experiencing difficulties accessing the platform since April 27, 2026. The issue has been confirmed by Microsoft's official Microsoft 365 Status account, which has been providing updates on the situation. Users have reported intermittent failures to load their inboxes, delays in email delivery, and complete inability to access the webmail interface, affecting multiple regions globally.<br><br>This outage is part of a broader pattern of instability within Microsoft 365 services that has persisted throughout early 2026. Earlier in the year, a significant disruption in January impacted multiple services including Outlook, Microsoft Teams, Defender, and SharePoint. The current issue has been classified as a 'Service Degradation', indicating that while core functionality is impaired, the service is not entirely offline.<br><br>A related issue has been identified with Outlook Classic, specifically involving the Microsoft Teams Meeting Add-in. This was triggered by an incompatible legacy Outlook build version that remains active in certain user environments. Microsoft has confirmed that a fix is being deployed and is expected to be completed by April 28, 2026.<br><br>To mitigate the impact, Microsoft has advised affected users to follow specific steps published in the admin center's More Info section. These steps are intended to serve as a temporary workaround until the broader fix is fully implemented. Temporary version restrictions placed on some users will be lifted once the deployment is complete.<br><br>Organizations that rely on Outlook.com for critical communications are advised to implement contingency email procedures until full service restoration is confirmed. Users and administrators can monitor live service health updates at status.cloud.microsoft or through the Microsoft 365 admin center under Health &gt; Service Health. Keeping abreast of these updates will help manage the impact of the ongoing service issues.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://cybersecuritynews.com/microsoft-outlook-com-issue-blocks-users/</p>]]></content:encoded></item><item><title><![CDATA[UK Biobank Data Breach Raises Concerns]]></title><description><![CDATA[The UK Biobank, a prominent biomedical research resource, has recently faced a data breach that has raised significant concerns regarding the protection of sensitive health information.]]></description><link>https://www.cybermaterial.com/p/uk-biobank-data-breach-raises-concerns</link><guid isPermaLink="false">https://www.cybermaterial.com/p/uk-biobank-data-breach-raises-concerns</guid><pubDate>Fri, 24 Apr 2026 12:46:15 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!80zj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa34f6caa-799d-48a8-b9dc-ad100192a2d2_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!80zj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa34f6caa-799d-48a8-b9dc-ad100192a2d2_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!80zj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa34f6caa-799d-48a8-b9dc-ad100192a2d2_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!80zj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa34f6caa-799d-48a8-b9dc-ad100192a2d2_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!80zj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa34f6caa-799d-48a8-b9dc-ad100192a2d2_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!80zj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa34f6caa-799d-48a8-b9dc-ad100192a2d2_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!80zj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa34f6caa-799d-48a8-b9dc-ad100192a2d2_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a34f6caa-799d-48a8-b9dc-ad100192a2d2_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:549521,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195344166?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa34f6caa-799d-48a8-b9dc-ad100192a2d2_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!80zj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa34f6caa-799d-48a8-b9dc-ad100192a2d2_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!80zj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa34f6caa-799d-48a8-b9dc-ad100192a2d2_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!80zj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa34f6caa-799d-48a8-b9dc-ad100192a2d2_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!80zj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa34f6caa-799d-48a8-b9dc-ad100192a2d2_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>The UK Biobank, a prominent biomedical research resource, has recently faced a data breach that has raised significant concerns regarding the protection of sensitive health information. The breach involved the unauthorized listing of de-identified participant data for sale on a Chinese consumer website associated with Alibaba. This incident has alarmed participants, researchers, and cybersecurity experts, highlighting vulnerabilities in data handling practices even when personal identifiers are removed.<br><br>The breach was discovered in April 2026, when UK Biobank officials found that data from their extensive database had been listed for sale online. The data, which is crucial for global medical research, includes genetic, lifestyle, and health information from approximately 500,000 UK volunteers. Professor Sir Rory Collins, the chief executive of UK Biobank, confirmed that the data had been shared with three academic institutions under strict contracts that were breached when the data appeared online.<br><br>Despite the breach, UK Biobank officials have emphasized that the compromised data did not contain personally identifiable information such as names, addresses, or NHS numbers. The data was de-identified, meaning that direct identification of participants was not possible. However, the breach still represents a serious violation of data access agreements, leading to the suspension of access for the involved institutions and individuals.<br><br>In response to the breach, UK Biobank has taken immediate action to mitigate risks and reassure its participants. Access to its research platform has been temporarily suspended while new security measures are implemented. These measures include strict limits on file sizes researchers can export, daily monitoring of exported files for suspicious activity, and a comprehensive forensic investigation led by the board.<br><br>To further secure the data, UK Biobank is enhancing its cloud-based platform with additional controls. These efforts aim to ensure that sensitive information remains protected while still allowing scientific research to continue. The organization is working closely with UK and Chinese authorities to address the breach and prevent future incidents.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://cyble.com/knowledge-hub/what-is-a-data-breach/</p>]]></content:encoded></item><item><title><![CDATA[Checkmarx Supply Chain Security Incident]]></title><description><![CDATA[Checkmarx has reported a supply chain security incident affecting several of its products, including DockerHub KICS images, GitHub actions, and VS Code extensions.]]></description><link>https://www.cybermaterial.com/p/checkmarx-supply-chain-security-incident</link><guid isPermaLink="false">https://www.cybermaterial.com/p/checkmarx-supply-chain-security-incident</guid><pubDate>Thu, 23 Apr 2026 12:56:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Gsq8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc77fc6d-b0e3-4b99-ab9b-b8940a6e22aa_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Gsq8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc77fc6d-b0e3-4b99-ab9b-b8940a6e22aa_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Gsq8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc77fc6d-b0e3-4b99-ab9b-b8940a6e22aa_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!Gsq8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc77fc6d-b0e3-4b99-ab9b-b8940a6e22aa_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!Gsq8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc77fc6d-b0e3-4b99-ab9b-b8940a6e22aa_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!Gsq8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc77fc6d-b0e3-4b99-ab9b-b8940a6e22aa_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Gsq8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc77fc6d-b0e3-4b99-ab9b-b8940a6e22aa_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dc77fc6d-b0e3-4b99-ab9b-b8940a6e22aa_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:240152,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195235193?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc77fc6d-b0e3-4b99-ab9b-b8940a6e22aa_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Gsq8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc77fc6d-b0e3-4b99-ab9b-b8940a6e22aa_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!Gsq8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc77fc6d-b0e3-4b99-ab9b-b8940a6e22aa_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!Gsq8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc77fc6d-b0e3-4b99-ab9b-b8940a6e22aa_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!Gsq8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc77fc6d-b0e3-4b99-ab9b-b8940a6e22aa_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Checkmarx has reported a supply chain security incident affecting several of its products, including DockerHub KICS images, GitHub actions, and VS Code extensions. The company is actively investigating the issue and has engaged external experts to assist in the response. Customers have been informed of the situation and advised on immediate actions to mitigate potential risks.<br><br>The investigation has revealed that the malicious artifacts did not override previously published, known safe versions. This means that customers using versions or SHAs published before the affected timeframes are not impacted. However, specific versions and tags have been identified as potentially compromised, including certain DockerHub KICS images and Checkmarx GitHub actions.<br><br>The affected artifacts include malicious tags and SHAs for the Checkmarx public DockerHub KICS image and the Checkmarx public ast-github-action. Additionally, certain versions of the Checkmarx VS Code extension and Developer Assist extension are under scrutiny, with timeframes for these still to be confirmed. The company has taken steps to remove the malicious artifacts, revoke exposed credentials, and block access to attacker-controlled infrastructure.<br><br>Checkmarx recommends that customers block access to specific domains and IP addresses associated with the incident. They should also use pinned SHAs, review or disable auto-update settings in IDE marketplaces, and rotate secrets and credentials if a compromise is suspected. Customers are advised to use only known safe versions of the affected products.<br><br>The investigation is ongoing, and Checkmarx urges customers to monitor their Community Incident Page for updates. For any questions or further assistance, customers are encouraged to contact Checkmarx through their Support Portal. The company appreciates the support and patience of its customers as it works to resolve the incident.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://checkmarx.com/blog/checkmarx-security-update-april-22/ </p>]]></content:encoded></item><item><title><![CDATA[Rituals Discloses Data Breach]]></title><description><![CDATA[Luxury cosmetics brand Rituals has announced a data breach that has compromised the personal information of its My Rituals members.]]></description><link>https://www.cybermaterial.com/p/rituals-discloses-data-breach</link><guid isPermaLink="false">https://www.cybermaterial.com/p/rituals-discloses-data-breach</guid><pubDate>Thu, 23 Apr 2026 12:54:15 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!MRDN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6b1d3a-c607-46a1-b68d-1403e0fe98c3_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MRDN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6b1d3a-c607-46a1-b68d-1403e0fe98c3_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MRDN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6b1d3a-c607-46a1-b68d-1403e0fe98c3_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!MRDN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6b1d3a-c607-46a1-b68d-1403e0fe98c3_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!MRDN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6b1d3a-c607-46a1-b68d-1403e0fe98c3_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!MRDN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6b1d3a-c607-46a1-b68d-1403e0fe98c3_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MRDN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6b1d3a-c607-46a1-b68d-1403e0fe98c3_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1b6b1d3a-c607-46a1-b68d-1403e0fe98c3_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:595962,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195234998?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6b1d3a-c607-46a1-b68d-1403e0fe98c3_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MRDN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6b1d3a-c607-46a1-b68d-1403e0fe98c3_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!MRDN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6b1d3a-c607-46a1-b68d-1403e0fe98c3_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!MRDN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6b1d3a-c607-46a1-b68d-1403e0fe98c3_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!MRDN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6b1d3a-c607-46a1-b68d-1403e0fe98c3_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Luxury cosmetics brand Rituals has announced a data breach that has compromised the personal information of its My Rituals members. The breach involved unauthorized access to customer data, which was subsequently downloaded by hackers. This incident highlights the ongoing challenges companies face in safeguarding customer information against cyber threats.<br><br>The breach specifically targeted the My Rituals membership database, which contains sensitive customer information. Hackers were able to access and download data, including names and addresses of the members. The company has not disclosed how the breach occurred or the exact number of individuals affected, but it has taken steps to address the situation.<br><br>Rituals is currently in the process of notifying all affected My Rituals members about the breach. The notification includes details about the compromised data and advice on how to protect themselves from potential misuse of their information. The company is also working with cybersecurity experts to investigate the breach and prevent future incidents.<br><br>The impact of this breach could be significant for the affected individuals, as personal information such as names and addresses can be used for identity theft or other malicious activities. Customers are advised to remain vigilant and monitor their accounts for any unusual activity. Additionally, they should be cautious of phishing attempts that may arise as a result of this breach.<br><br>To mitigate the risks associated with this data breach, Rituals recommends that affected members change their passwords and consider implementing additional security measures, such as two-factor authentication, where possible. The company is committed to enhancing its security protocols to better protect customer data in the future.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://www.rituals.com/en-gb/faq/data/?qid=ka0Px000000Me3dIAC  </p>]]></content:encoded></item><item><title><![CDATA[Ransomware Attack on Hospital Caribbean Medical Center]]></title><description><![CDATA[Hospital Caribbean Medical Center in Puerto Rico has suffered a significant ransomware attack, affecting up to 92,000 individuals.]]></description><link>https://www.cybermaterial.com/p/ransomware-attack-on-hospital-caribbean</link><guid isPermaLink="false">https://www.cybermaterial.com/p/ransomware-attack-on-hospital-caribbean</guid><pubDate>Wed, 22 Apr 2026 12:56:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!reBh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f6d8f4c-9331-4f6c-9917-b96732c4916e_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!reBh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f6d8f4c-9331-4f6c-9917-b96732c4916e_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!reBh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f6d8f4c-9331-4f6c-9917-b96732c4916e_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!reBh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f6d8f4c-9331-4f6c-9917-b96732c4916e_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!reBh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f6d8f4c-9331-4f6c-9917-b96732c4916e_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!reBh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f6d8f4c-9331-4f6c-9917-b96732c4916e_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!reBh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f6d8f4c-9331-4f6c-9917-b96732c4916e_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1f6d8f4c-9331-4f6c-9917-b96732c4916e_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:516726,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195029821?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f6d8f4c-9331-4f6c-9917-b96732c4916e_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!reBh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f6d8f4c-9331-4f6c-9917-b96732c4916e_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!reBh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f6d8f4c-9331-4f6c-9917-b96732c4916e_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!reBh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f6d8f4c-9331-4f6c-9917-b96732c4916e_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!reBh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f6d8f4c-9331-4f6c-9917-b96732c4916e_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Hospital Caribbean Medical Center in Puerto Rico has suffered a significant ransomware attack, affecting up to 92,000 individuals. The incident was publicly disclosed on February 8, 2026, although the exact timing of the attack remains unclear. The hospital's monitoring systems detected the intrusion, prompting immediate actions to contain the breach and secure its IT infrastructure. The Gentlemen, a ransomware group, has claimed responsibility and threatened to release stolen data unless a ransom is paid.<br><br>The breach at Hospital Caribbean Medical Center is part of a series of recent data security incidents affecting healthcare facilities. Alongside this attack, Murray County Medical Center in Minnesota and Aligned Orthopedic Partners in Maryland have also reported data breaches. These incidents highlight the ongoing vulnerabilities in healthcare IT systems and the persistent threat posed by cybercriminals targeting sensitive patient information.<br><br>Technical details about the Hospital Caribbean Medical Center breach are limited, as the hospital has not specified the types of data exposed. However, the breach is listed on the HHS&#8217; Office for Civil Rights breach portal, indicating its severity. The Gentlemen's claim of exfiltrating sensitive data, including patient information, underscores the potential risk to affected individuals.<br><br>The impact of these breaches is significant, with personal and medical information potentially compromised. In the case of Murray County Medical Center, exposed data included Social Security numbers, health insurance details, and medical histories. Aligned Orthopedic Partners reported similar data exposure, though the number of affected individuals is not yet confirmed.<br><br>In response to these incidents, affected healthcare facilities have taken steps to bolster their cybersecurity measures. Hospital Caribbean Medical Center has reinforced its monitoring systems and updated its security protocols. Individuals potentially impacted by these breaches are advised to remain vigilant, monitor their personal information for signs of misuse, and consider utilizing identity protection services offered by the affected institutions.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://www.hipaajournal.com/hospital-caribbean-medical-center-data-breach/ </p>]]></content:encoded></item><item><title><![CDATA[Volo Protocol Hacked for $3.5M]]></title><description><![CDATA[Volo Protocol, a decentralized finance platform, has confirmed a security breach that resulted in the loss of approximately $3.5 million.]]></description><link>https://www.cybermaterial.com/p/volo-protocol-hacked-for-35m</link><guid isPermaLink="false">https://www.cybermaterial.com/p/volo-protocol-hacked-for-35m</guid><pubDate>Wed, 22 Apr 2026 12:51:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Fv2o!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0efd90c-37d5-4f24-b4c3-74da69abffc1_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Fv2o!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0efd90c-37d5-4f24-b4c3-74da69abffc1_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Fv2o!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0efd90c-37d5-4f24-b4c3-74da69abffc1_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!Fv2o!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0efd90c-37d5-4f24-b4c3-74da69abffc1_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!Fv2o!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0efd90c-37d5-4f24-b4c3-74da69abffc1_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!Fv2o!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0efd90c-37d5-4f24-b4c3-74da69abffc1_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Fv2o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0efd90c-37d5-4f24-b4c3-74da69abffc1_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f0efd90c-37d5-4f24-b4c3-74da69abffc1_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:517264,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195029381?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0efd90c-37d5-4f24-b4c3-74da69abffc1_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Fv2o!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0efd90c-37d5-4f24-b4c3-74da69abffc1_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!Fv2o!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0efd90c-37d5-4f24-b4c3-74da69abffc1_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!Fv2o!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0efd90c-37d5-4f24-b4c3-74da69abffc1_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!Fv2o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0efd90c-37d5-4f24-b4c3-74da69abffc1_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Volo Protocol, a decentralized finance platform, has confirmed a security breach that resulted in the loss of approximately $3.5 million. The exploit targeted select vaults within the protocol, affecting digital assets such as Wrapped Bitcoin (WBTC), Matrixdock Gold XAUm, and USDC. The incident is part of a troubling trend of attacks on DeFi platforms, highlighting ongoing security challenges in the sector.<br><br>Upon detecting the breach, Volo Protocol took immediate action by notifying the Sui Foundation and its ecosystem partners. The team quickly froze the affected vaults to prevent further losses and initiated efforts to recover the stolen funds. This swift response was crucial in containing the damage and ensuring that the breach did not spread to other parts of the platform.<br><br>The protocol has assured users that the exploit was limited to three isolated vaults, with no shared vulnerabilities identified across the platform. Approximately $28 million in total value locked across other vaults remains secure, according to Volo's statement. This containment has provided some reassurance to users and stakeholders concerned about the security of their assets.<br><br>Volo Protocol has also announced its intention to absorb the financial losses from the breach rather than passing them on to users. While specific details of the remediation plan have not been finalized, this decision is likely aimed at maintaining user trust and confidence in the platform.<br><br>As the investigation continues, Volo Protocol is focused on recovering the stolen funds and strengthening its security measures to prevent future incidents. Users are advised to stay informed about any updates from the protocol and to exercise caution when engaging with DeFi platforms, given the ongoing risks in the sector.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://cointelegraph.com/news/volo-defi-3-5m-exploit-vault-attack-recovery?utm_source=rss_feed&amp;utm_medium=feed&amp;utm_campaign=rss_partner_inbound </p>]]></content:encoded></item><item><title><![CDATA[Lovable AI App Builder API Flaw]]></title><description><![CDATA[The AI application builder Lovable has been hit by a significant data breach caused by an unpatched API vulnerability.]]></description><link>https://www.cybermaterial.com/p/lovable-ai-app-builder-api-flaw</link><guid isPermaLink="false">https://www.cybermaterial.com/p/lovable-ai-app-builder-api-flaw</guid><pubDate>Tue, 21 Apr 2026 12:21:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!5_uK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b87614e-c11c-470f-832f-4d133189357d_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5_uK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b87614e-c11c-470f-832f-4d133189357d_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5_uK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b87614e-c11c-470f-832f-4d133189357d_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!5_uK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b87614e-c11c-470f-832f-4d133189357d_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!5_uK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b87614e-c11c-470f-832f-4d133189357d_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!5_uK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b87614e-c11c-470f-832f-4d133189357d_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5_uK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b87614e-c11c-470f-832f-4d133189357d_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4b87614e-c11c-470f-832f-4d133189357d_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:172064,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/194908003?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b87614e-c11c-470f-832f-4d133189357d_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5_uK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b87614e-c11c-470f-832f-4d133189357d_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!5_uK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b87614e-c11c-470f-832f-4d133189357d_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!5_uK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b87614e-c11c-470f-832f-4d133189357d_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!5_uK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b87614e-c11c-470f-832f-4d133189357d_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The AI application builder Lovable has been hit by a significant data breach caused by an unpatched API vulnerability. This security flaw has been publicly disclosed by researchers and poses a serious risk to the integrity and confidentiality of user data on the platform. The breach affects a wide range of projects, potentially compromising sensitive information and user credentials.<br><br>The vulnerability in question allows unauthorized access to sensitive project data, including source code and user credentials. This issue impacts all projects created on the Lovable platform before November 2025, leaving a substantial number of users exposed to potential data theft and misuse. The disclosure of this flaw has raised concerns among users and security professionals about the security measures in place at Lovable.<br><br>Technical details of the vulnerability have not been fully disclosed to prevent further exploitation, but it is clear that the flaw resides in the API used by Lovable's application builder. This API is integral to the platform's functionality, and the breach highlights the importance of securing such interfaces against unauthorized access. The exposure of source code and credentials could lead to further security incidents if not addressed promptly.<br><br>The impact of this breach is significant, as it involves potentially thousands of projects and users. The exposure of sensitive data could lead to unauthorized access, data theft, and further exploitation of the compromised information. Users of the Lovable platform are at risk of having their projects and personal information accessed by malicious actors.<br><br>To mitigate the risks associated with this breach, users are advised to review their projects for any signs of unauthorized access. It is also recommended that users update their credentials immediately and monitor their accounts for any suspicious activity. Lovable should prioritize patching the vulnerability and enhancing their security measures to prevent future incidents.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://cybernews.com/security/lovable-vibe-coding-flaw-apology/ </p>]]></content:encoded></item><item><title><![CDATA[ANTS Data Breach Exposes User Personal Details]]></title><description><![CDATA[A recent data breach at the ANTS portal in France has highlighted significant data security concerns within the country's public sector.]]></description><link>https://www.cybermaterial.com/p/ants-data-breach-exposes-user-personal</link><guid isPermaLink="false">https://www.cybermaterial.com/p/ants-data-breach-exposes-user-personal</guid><pubDate>Tue, 21 Apr 2026 12:20:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!f8Yo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88796a10-2dd0-4412-828d-28d712b76ee1_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f8Yo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88796a10-2dd0-4412-828d-28d712b76ee1_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f8Yo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88796a10-2dd0-4412-828d-28d712b76ee1_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!f8Yo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88796a10-2dd0-4412-828d-28d712b76ee1_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!f8Yo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88796a10-2dd0-4412-828d-28d712b76ee1_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!f8Yo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88796a10-2dd0-4412-828d-28d712b76ee1_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f8Yo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88796a10-2dd0-4412-828d-28d712b76ee1_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/88796a10-2dd0-4412-828d-28d712b76ee1_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:321614,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/194907838?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88796a10-2dd0-4412-828d-28d712b76ee1_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f8Yo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88796a10-2dd0-4412-828d-28d712b76ee1_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!f8Yo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88796a10-2dd0-4412-828d-28d712b76ee1_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!f8Yo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88796a10-2dd0-4412-828d-28d712b76ee1_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!f8Yo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88796a10-2dd0-4412-828d-28d712b76ee1_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>A recent data breach at the ANTS portal in France has highlighted significant data security concerns within the country's public sector. Detected on April 15, 2026, by the National Agency for Secure Documents, the breach may have exposed personal data associated with both individual and professional accounts. This incident underscores the ongoing challenges faced by public sector entities in safeguarding sensitive information against unauthorized access and misuse.<br><br>The compromised data includes critical identification details such as login IDs, names, email addresses, dates of birth, and unique account identifiers. In some instances, additional information like postal addresses, places of birth, and phone numbers may also be involved. However, authorities have clarified that the breach does not include documents submitted during administrative procedures, nor does it allow direct access to user accounts on the portal. Despite this, the exposed data poses potential risks for targeted phishing campaigns and identity misuse attempts.<br><br>In response to the breach, affected users are being directly notified, and the incident has been reported to the National Commission for Information Technology and Civil Liberties under GDPR regulations. A formal investigation is underway, with a separate report submitted to the Paris Public Prosecutor. The National Cybersecurity Agency of France is collaborating with ANTS to investigate the breach's origin, timeline, and full scope, while security measures have been reinforced to protect user data and ensure service continuity.<br><br>This breach follows other significant incidents in France, such as the EduConnect cyberattack and the FICOBA database breach, both of which involved unauthorized access through compromised credentials. These cases illustrate a pattern where attackers exploit identity compromise and timing vulnerabilities to access sensitive systems. The EduConnect incident led to the implementation of two-factor authentication and other security measures to mitigate future risks.<br><br>As investigations into the ANTS data breach continue, the findings are expected to influence how public sector platforms in France approach security and user data protection. Authorities are emphasizing the importance of stronger controls around identity management, access monitoring, and data minimization to prevent similar incidents in the future. Users are advised to remain vigilant against unsolicited communications that may exploit the exposed data for phishing or identity theft purposes.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://thecyberexpress.com/ants-data-breach-impacts-user-personal-details/</p>]]></content:encoded></item><item><title><![CDATA[$290 Million Kelp DAO Crypto Heist]]></title><description><![CDATA[A significant cyberattack has resulted in the theft of $290 million from Kelp DAO, a decentralized autonomous organization.]]></description><link>https://www.cybermaterial.com/p/290-million-kelp-dao-crypto-heist</link><guid isPermaLink="false">https://www.cybermaterial.com/p/290-million-kelp-dao-crypto-heist</guid><pubDate>Tue, 21 Apr 2026 12:18:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!roiM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc113f20d-4cae-4162-bb1c-03a6f4bd21f5_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!roiM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc113f20d-4cae-4162-bb1c-03a6f4bd21f5_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!roiM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc113f20d-4cae-4162-bb1c-03a6f4bd21f5_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!roiM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc113f20d-4cae-4162-bb1c-03a6f4bd21f5_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!roiM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc113f20d-4cae-4162-bb1c-03a6f4bd21f5_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!roiM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc113f20d-4cae-4162-bb1c-03a6f4bd21f5_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!roiM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc113f20d-4cae-4162-bb1c-03a6f4bd21f5_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c113f20d-4cae-4162-bb1c-03a6f4bd21f5_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:440594,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/194907741?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc113f20d-4cae-4162-bb1c-03a6f4bd21f5_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!roiM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc113f20d-4cae-4162-bb1c-03a6f4bd21f5_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!roiM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc113f20d-4cae-4162-bb1c-03a6f4bd21f5_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!roiM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc113f20d-4cae-4162-bb1c-03a6f4bd21f5_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!roiM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc113f20d-4cae-4162-bb1c-03a6f4bd21f5_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>A significant cyberattack has resulted in the theft of $290 million from Kelp DAO, a decentralized autonomous organization. The attack has been attributed to hackers who exploited vulnerabilities in LayerZero's decentralized virtual network. This incident highlights the ongoing risks faced by organizations operating in the cryptocurrency sector, particularly those relying on decentralized technologies.<br><br>The attackers specifically targeted LayerZero's infrastructure by compromising certain remote procedure calls (RPCs). In addition, they launched distributed denial-of-service (DDoS) attacks against other RPCs, forcing the system to failover to a compromised infrastructure. This sophisticated approach allowed the hackers to redirect traffic and execute their heist successfully.<br><br>The technical details of the attack suggest a high level of planning and execution, indicating that the perpetrators were well-versed in the intricacies of decentralized networks. By manipulating the failover mechanisms, they were able to bypass security measures and access the funds. This method of attack underscores the vulnerabilities inherent in decentralized systems that rely on multiple points of failure.<br><br>The impact of this breach is significant, not only in terms of the financial loss but also in the potential erosion of trust in decentralized financial systems. Organizations that utilize similar technologies must be vigilant and proactive in securing their networks. The attribution of the attack to North Korean hackers further complicates the geopolitical implications of such cybercrimes.<br><br>To mitigate the risk of similar incidents, organizations should conduct thorough security audits of their infrastructure, particularly focusing on RPCs and failover mechanisms. Continuous monitoring for unusual activity and implementing robust DDoS protection measures are also recommended to enhance the resilience of decentralized networks against sophisticated cyber threats.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://www.binance.com/en/square/post/04-20-2026-crypto-news-aave-tvl-drops-8-billion-after-kelp-dao-hack-triggers-liquidity-crunch-314580858247121 </p>]]></content:encoded></item><item><title><![CDATA[Notion Pages Leak User Data]]></title><description><![CDATA[Notion, a popular platform for productivity and collaboration, is facing scrutiny after security researchers discovered a significant vulnerability.]]></description><link>https://www.cybermaterial.com/p/notion-pages-leak-user-data</link><guid isPermaLink="false">https://www.cybermaterial.com/p/notion-pages-leak-user-data</guid><pubDate>Mon, 20 Apr 2026 12:37:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!fTEJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc6a95f4-1a28-4498-9261-7eaa07796117_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fTEJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc6a95f4-1a28-4498-9261-7eaa07796117_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fTEJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc6a95f4-1a28-4498-9261-7eaa07796117_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!fTEJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc6a95f4-1a28-4498-9261-7eaa07796117_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!fTEJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc6a95f4-1a28-4498-9261-7eaa07796117_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!fTEJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc6a95f4-1a28-4498-9261-7eaa07796117_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fTEJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc6a95f4-1a28-4498-9261-7eaa07796117_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dc6a95f4-1a28-4498-9261-7eaa07796117_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:47425,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/194791192?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc6a95f4-1a28-4498-9261-7eaa07796117_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fTEJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc6a95f4-1a28-4498-9261-7eaa07796117_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!fTEJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc6a95f4-1a28-4498-9261-7eaa07796117_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!fTEJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc6a95f4-1a28-4498-9261-7eaa07796117_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!fTEJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc6a95f4-1a28-4498-9261-7eaa07796117_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Notion, a popular platform for productivity and collaboration, is facing scrutiny after security researchers discovered a significant vulnerability. Public Notion pages are leaking personally identifiable information (PII) of users who have edited them, including full names, email addresses, and profile photos. This raises privacy concerns for organizations using Notion for public documentation.<br><br>The vulnerability is rooted in how Notion handles user data in public workspaces. When a document is published online, Notion embeds editor UUIDs (Universally Unique Identifiers) in the page's block permissions. These identifiers are accessible without authentication, allowing attackers to retrieve user profiles through a single unauthenticated POST request to Notion's internal API endpoint. This lack of access control means that public pages can inadvertently expose the contact details of all editors.<br><br>The issue has been known since July 2022 when it was reported to Notion via the HackerOne bug bounty program. However, Notion's security team initially classified the report as 'informative' and closed it without implementing a fix. The problem resurfaced recently, causing frustration among developers and cybersecurity professionals who are concerned about the potential for phishing and social engineering attacks.<br><br>In response to the backlash, Notion has acknowledged the problem and is working on a permanent fix. The company plans to either remove PII from public endpoints or implement an email proxy system to protect user information. Until these measures are in place, organizations should be cautious about using Notion for public-facing resources.<br><br>To mitigate risks, organizations should review their use of public Notion pages and consider restricting access to sensitive information. Staying informed about updates from Notion and implementing additional security measures can help protect against potential data exposure.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://x.com/i/trending/2045988234212024677 </p>]]></content:encoded></item><item><title><![CDATA[Vercel breach due to third-party AI hack]]></title><description><![CDATA[Vercel, a cloud platform known for supporting frameworks like Next.js, has reported a security breach stemming from a compromised third-party AI tool, Context.ai.]]></description><link>https://www.cybermaterial.com/p/vercel-breach-due-to-third-party</link><guid isPermaLink="false">https://www.cybermaterial.com/p/vercel-breach-due-to-third-party</guid><pubDate>Mon, 20 Apr 2026 12:36:21 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!aR9J!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22c34cc5-c307-4de0-9c51-4325c213694b_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aR9J!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22c34cc5-c307-4de0-9c51-4325c213694b_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aR9J!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22c34cc5-c307-4de0-9c51-4325c213694b_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!aR9J!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22c34cc5-c307-4de0-9c51-4325c213694b_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!aR9J!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22c34cc5-c307-4de0-9c51-4325c213694b_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!aR9J!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22c34cc5-c307-4de0-9c51-4325c213694b_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aR9J!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22c34cc5-c307-4de0-9c51-4325c213694b_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/22c34cc5-c307-4de0-9c51-4325c213694b_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:391463,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/194791101?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22c34cc5-c307-4de0-9c51-4325c213694b_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aR9J!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22c34cc5-c307-4de0-9c51-4325c213694b_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!aR9J!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22c34cc5-c307-4de0-9c51-4325c213694b_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!aR9J!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22c34cc5-c307-4de0-9c51-4325c213694b_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!aR9J!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22c34cc5-c307-4de0-9c51-4325c213694b_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Vercel, a cloud platform known for supporting frameworks like Next.js, has reported a security breach stemming from a compromised third-party AI tool, Context.ai. This breach allowed attackers to gain access to an employee's Google Workspace account, which was then used to infiltrate parts of Vercel's internal systems. The incident exposed some non-sensitive customer-related data, but Vercel has confirmed that sensitive environment variables remained secure and were not accessed by the attackers.<br><br>The breach was initiated through the compromise of Context.ai, a tool used by a Vercel employee. The attackers demonstrated a high level of skill and knowledge of Vercel's systems, moving quickly to exploit the access gained through the employee's Google Workspace account. The compromised access allowed them to reach certain Vercel environments and environment variables that were not marked as sensitive.<br><br>Vercel has engaged cybersecurity firm Mandiant and other security partners to investigate the breach and has notified law enforcement. The company is also working closely with Context.ai to assess the full extent of the breach. Vercel has urged its users to be vigilant by checking their account activity logs for any suspicious actions and to rotate any exposed secrets such as API keys or tokens.<br><br>In response to the breach, Vercel recommends that users enhance their security measures. This includes marking environment variables as sensitive, updating security tokens, and enabling stronger protections within their systems. Additionally, Vercel has advised Google Workspace administrators and users to check for and remove a specific suspicious OAuth app ID linked to the breach.<br><br>The breach highlights the potential risks associated with third-party tools and the importance of robust security practices. Vercel's proactive measures and collaboration with security experts aim to mitigate the impact of the breach and prevent future incidents. Users are encouraged to follow the recommended actions to secure their accounts and data.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://vercel.com/kb/bulletin/vercel-april-2026-security-incident </p>]]></content:encoded></item></channel></rss>