Latest Internet & Cybersecurity News

๐Ÿ“…April 5, 2026 at 1:00 PM
Major cybersecurity incidents dominate headlines: ShinyHunters threaten Cisco data leak, North Korean spies target devs and firms, FBI surveillance breached by Chinese hackers, plus AI breaches and phishing scams.
1

ShinyHunters Claim Theft of 3M+ Cisco Records via Salesforce and AWS

Hackers from ShinyHunters claim to have stolen over 3 million Cisco records through Salesforce and AWS vulnerabilities, threatening a public leak if demands are unmet by April 3, 2026.Source 1 The group has warned of releasing the data publicly.Source 1 This follows their pattern of high-profile breaches.Source 1

2

UNC1069 Targets Node.js Maintainers with Fake LinkedIn and Slack Profiles

North Korean group UNC1069 is impersonating identities on LinkedIn and Slack to target Node.js maintainers, spreading malware to compromise open-source packages.Source 1 The campaign aims to infiltrate supply chains.Source 1 Security experts urge vigilance in maintainer communications.Source 1

3

North Korean Hackers Abuse GitHub to Spy on South Korean Firms

FortiGuard Labs uncovered a high-severity spying campaign by North Korean actors using GitHub to target South Korean companies.Source 1 The operation involves malicious repositories for espionage.Source 1 Firms are advised to scan dependencies carefully.Source 1

4

AI Firm Mercor Confirms Breach, Hackers Claim 4TB Stolen Data

Mercor, an AI company, confirmed a data breach linked to a LiteLLM supply chain attack, with hackers claiming 4TB of sensitive data and internal systems stolen.Source 1 The incident exposes risks in AI supply chains.Source 1 Mercor is investigating the full impact.Source 1

5

Microsoft Warns of WhatsApp Attachments Spreading Backdoor Malware

Microsoft reported VBS malware spreading via WhatsApp attachments, installing backdoors on Windows PCs for remote hacker access and system control.Source 1 Users should avoid suspicious attachments.Source 1 The threat targets broad user bases.Source 1

6

Storm Infostealer Sold as Malware-as-a-Service Targeting Browsers and Wallets

Varonis Threat Labs revealed the Storm infostealer, a subscription service bypassing Google Chrome encryption to steal browser data, wallets, and accounts.Source 1 It operates as MaaS for cybercriminals.Source 1 Mitigation includes updated protections.Source 1

7

Chinese Hackers Breach FBI's Secret Surveillance System

Chinese hackers conducted a supply chain attack via a third-party ISP, breaching the FBI's surveillance system, classified as a 'Serious Incident' threatening national security.Source 3 Detected on February 17, 2026, in Virgin Islands offices.Source 3 FBI notified Congress, involving CISA and NSA.Source 3

8

AI-Driven Security Feedback Loop Attack Freezes Financial Trading Floor

A global financial hub's AI security orchestrator was tricked by fake threats, automatically quarantining the primary trading floor and causing a 4-hour market freeze.Source 2 This highlights risks of autonomous response systems.Source 2 Experts warn of weaponized AI defenses.Source 2

9

CloudSweep Ransomware Escalates with Metadata Obfuscation in Phase 40

CloudSweep group advanced to phase 40, using metadata obfuscation by renaming and reindexing backups, hindering automated recovery in healthcare targets.Source 2 The attack masks intrusions and disrupts data restoration.Source 2 Recovery now requires manual intervention.Source 2

10

Austrian Police Warn of Sophisticated ID-Austria Phishing Scam

As thousands of ID-Austria digital IDs near expiry, scammers send fake SMS luring users to phony portals for data theft and remote access installs.Source 4 Police confirmed frauds with five-figure losses.Source 4 Official renewals use secure apps only.Source 4

11

EU Advances Sovereign Cloud Regulations Amid Shadow AI Risks

New EU Sovereign Cloud rules address data sovereignty, while Shadow AI emerges as a top enterprise risk in cybersecurity briefings.Source 2 These developments urge transitions to post-quantum cryptography.Source 2 Organizations must adapt compliance strategies.Source 2