Cyber Briefing: 2026.04.08
U.S. agencies warn that Iranian hackers are actively targeting American critical infrastructure, while multiple critical vulnerabilities, including flaws in WordPress plugins, Flowise, and Fortinet...
👉 What's happening in cybersecurity today?
A series of cybersecurity developments highlights escalating threats, from ransomware groups exploiting vulnerabilities and zero-days to data breaches exposing employees and clients across major organizations.
Welcome to Cyber Briefing, the newsletter that informs you about the latest cybersecurity advisories, alerts, incidents and news every weekday.
First time seeing this? Please Subscribe
Listen to our podcast here ⏬
🚨 Cyber Alerts
1. WordPress Plugin XSS Vulnerability
A critical cross-site scripting (XSS) vulnerability has been discovered in a popular WordPress plugin, posing a significant risk to thousands of websites. This vulnerability can be exploited in mass-attack campaigns, potentially affecting any site using the plugin, regardless of its size or traffic. Website administrators should immediately update the affected plugin or seek assistance from their hosting provider or web developer to mitigate the risk.
2. Critical Flowise flaw CVE-2025-59528
A critical vulnerability in the Flowise platform, identified as CVE-2025-59528, is being actively exploited by attackers to execute malicious code and access systems. This flaw, due to inadequate validation of JavaScript inputs, affects Flowise versions up to 3.0.5 and has been addressed in version 3.0.6. Users of Flowise should immediately update to the latest version to protect against potential system compromise and data theft.
3. Fortinet FortiClient EMS Zero-Day Flaw
A critical vulnerability in Fortinet’s FortiClient Endpoint Management Server (EMS) has been actively exploited by hackers since March, allowing unauthorized remote code execution. This flaw affects versions 7.4.5 and 7.4.6 of FortiClient EMS, and Fortinet has issued a temporary hotfix while a permanent patch is expected in version 7.4.7. Organizations using on-premises deployments should apply the hotfix immediately, review logs for suspicious activity, and consider restoring from backups if compromise is suspected.
For more alerts click here!
💥 Cyber Incidents
4. Brockton Hospital Probes Cyber Attack
Signature Healthcare Brockton Hospital is currently managing a cybersecurity incident that has disrupted several of its digital information systems. While the facility has transitioned to manual record-keeping to maintain patient safety, officials report there is currently no evidence that sensitive data has been compromised.
5. Iranian Hackers Target US Infrastructure
Iranian government-backed hackers are intensifying their attacks on U.S. critical infrastructure, targeting sectors such as water, energy, and local government facilities. These cyberattacks, which manipulate industrial control systems, have already led to operational disruptions and financial losses. Organizations in these sectors should enhance their cybersecurity measures and remain vigilant against potential threats to mitigate further risks.
6. Hacker Breaches China Supercomputer
A hacker has reportedly infiltrated a state-run supercomputer in China, making off with approximately 10 petabytes of highly sensitive defense and scientific data. This massive breach, which allegedly includes missile schematics and aerospace research, is being described by experts as potentially the largest data heist ever to hit the nation.
For more incidents click here!
📢 Cyber News
7. Feds neutralize APT28 espionage network
Russian state-sponsored hackers, known as APT28 or Fancy Bear, compromised over 18,000 routers across 120 countries to conduct a large-scale espionage campaign. The FBI, in collaboration with other agencies and companies, neutralized this threat by resetting DNS settings on affected devices, effectively halting the espionage activities. Organizations in sectors such as government, telecom, and energy were targeted, and affected parties should ensure their network devices are updated and secured against known vulnerabilities.
8. Record $21B Lost to Cybercrime
In the past year, cyber-enabled crimes have cost U.S. victims nearly $21 billion, according to the FBI. The primary threats contributing to these losses include investment scams, business email compromise, tech support fraud, and data breaches. To mitigate these risks, individuals and organizations should enhance their cybersecurity measures, remain vigilant against suspicious communications, and report any incidents to authorities promptly.
9. Anthropic Previews Mythos AI Model
Anthropic is launching a preview of its Mythos AI model designed to help major technology firms and infrastructure providers identify and repair security vulnerabilities. The initiative involves a partnership with industry leaders like Amazon, Microsoft, and Google to strengthen the defenses of critical software and hardware systems.
For more news click here!
📈Cyber Stocks
Cybersecurity stocks were mostly higher on Wednesday, April 8, 2026, with major platform providers staging a significant mid-week rally. The sector continues to display impressive relative strength, decoupling from the broader NASDAQ volatility as enterprise security spending remains a top priority for CIOs entering the new fiscal quarter.
Market Summary
Today’s price action was characterized by a surge in “quality growth” names. Strong buying volume in the top-tier players suggests that institutional investors are repositioning ahead of the upcoming earnings cycle, favoring companies with dominant market share and high recurring revenue.
Endpoint Breakout: CrowdStrike (CRWD) led the rally with a powerful intraday move of +6.18%, closing the period at -11.79%. This move represents a major technical reclaim, as the stock bounces off its March lows with significant momentum.
Infrastructure Strength: Fortinet (FTNT) continues its trend of outperformance, trading up to +2.42%. Its ability to maintain a positive trajectory while its peers are still recovering from YTD lows cements its status as a “safe haven” within the security sector.
Identity Recovery: Okta (OKTA) saw a relief bounce to end at -12.76%, tracking the broader recovery in cloud software as identity protection remains a mandatory component of modern digital transformation projects.
Point Solution Laggard: Rapid7 (RPD) saw a slight pullback, trading at -62.26%. While the broader sector rallied, RPD struggled to catch the same bid, highlighting the continued investor preference for broad platforms over niche vulnerability tools.
Key Insight: We are seeing a “V-Shaped Recovery” in the sector’s elite. The sharp move in CRWD today indicates that “fear of missing out” (FOMO) is returning to the cybersecurity space as the risk-reward profile becomes too attractive for fund managers to ignore. For the briefing audience, this confirms that despite macro headwinds, the “Cybersecurity Super-Cycle” remains intact, led by the consolidated platforms that define the modern security stack.
💡 Cyber Tip
🤖 Neutralizing Stored XSS in WordPress Plugins
A critical vulnerability in a popular inquiry form plugin allows authenticated administrators to inject malicious scripts that permanently reside on your website. If left unpatched, this flaw can be used in mass-exploit campaigns to hijack sessions, steal sensitive data, or deface your site.
🛠️ What You Should Do
Update Immediately: Navigate to your WordPress Dashboard and update the “Inquiry Form” plugin to the latest version immediately.
Audit User Permissions: Review all users with “Administrator” privileges and demote any accounts that do not strictly require high-level access to limit the attack surface.
Enable a WAF: Implement a Web Application Firewall (like Wordfence or Cloudflare) to block common XSS injection patterns before they reach your server.
Purge Cache: After updating, clear your site and server-side caches to ensure any potentially cached malicious scripts are removed.
⚠️ Why This Matters
Stored XSS is particularly dangerous because the malicious script is saved directly on your server, affecting every visitor who views the compromised page. Because this vulnerability can be leveraged in automated mass-attacks, even small websites are at high risk of losing data integrity and user trust.
📚 Cyber Book
Cybersecurity Upside Down: Rethink Your Cybersecurity Strategy by Benny Czarny
Get book: https://amzn.to/4slLxPb
Copyright © 2026 CyberMaterial. All Rights Reserved.
Follow CyberMaterial on:
Substack, LinkedIn, Twitter, Reddit, Instagram, Facebook, YouTube, and Medium










