Latest Internet & Cybersecurity News

📅April 24, 2026 at 1:00 PM
China-linked hackers exploit covert router networks for espionage; LMDeploy AI flaw rapidly exploited; regulators probe Anthropic AI cyber risks; Canada Life data breach under investigation.
1

Cybersecurity Agencies Warn of China-Linked Covert Networks for Espionage

Global agencies including CISA and NCSC-UK issued an advisory on China-nexus actors building botnets from compromised SOHO routers and IoT devices for all phases of cyber attacks.Source 1 These dynamic networks evade traditional defenses like IP blocklists and are managed by Chinese firms like Integrity Technology Group behind Flax Typhoon.Source 1 Organizations urged to implement zero trust, dynamic threat feeds, and traffic baselining.Source 4

2

LMDeploy CVE-2026-33626 Exploited in Under 13 Hours for Cloud Credential Theft

A high-severity SSRF flaw in LMDeploy LLM toolkit (versions <=0.12.0) was exploited within 12 hours 31 minutes of disclosure, targeting vision language models.Source 2 Attackers from IP 103.116.72.119 conducted internal scanning and credential theft via honeypots.Source 2 This highlights rapid weaponization of AI infrastructure vulnerabilities.Source 2

3

Hackers Abuse Compromised Routers to Build China-Linked Cyber Infrastructure

China-linked threat actors hijack routers and edge devices worldwide to create hidden networks blending malicious traffic with normal activity.Source 4 Multiple groups share these evolving botnets, causing 'IOC extinction' and enabling data exfiltration.Source 4 NCSC advisory recommends mapping edge traffic and enforcing 2FA, zero trust controls.Source 4

4

Regulators Scrutinize Anthropic's Mythos Over Banking Cyber Risks

Global regulators and banks assess cyber risks from Anthropic's Mythos after unauthorized access; India Finance Ministry convenes bank CEOs.Source 5 Vulnerabilities in Indian payment systems heighten risks from LLM-enabled attacks like social engineering and malware.Source 5 U.S., Canada, UK officials also engaging banking leaders for containment measures.Source 5

5

Canada Life Investigates Cybersecurity Data Breach Impacting Customers

Canada Life is probing a cybersecurity incident potentially exposing personal data of thousands of customers.Source 7 The company posted a statement on its website confirming the investigation.Source 7 Details on breach scope and affected data types remain under review.Source 7

6

AI Accelerates State-Sponsored Cybersecurity Threats Globally

State cyber operations integrate AI for persistent, scalable attacks, outpacing defenders over past three years.Source 6 Shifts emphasize automation, economic pressure on ransomware havens, and pre-crisis cyber coordination with private sector.Source 6 Cyber embedded in national security strategies worldwide.Source 6

7

3rd Namibia International Cybersecurity Conference Kicks Off Today

The 3RD NAMIBIA INTERNATIONAL CYBERSECURITY CONFERENCE & EXHIBITION (NICSC) is underway on April 24, 2026.Source 3 Event focuses on global cybersecurity challenges and solutions.Source 3 Features discussions and exhibitions for industry leaders.Source 3

8

US Targets Global Crypto Scam Ring from Myanmar in Cybersecurity Crackdown

US authorities target international crypto scam operations originating from Myanmar amid rising cyber threats.Source 6 Part of broader efforts against state and criminal cyber activities.Source 6 Highlights intersection of cybercrime and financial security.Source 6

9

TIPS 2026 Cybersecurity Data Privacy Conference Highlights Emerging Tips

TIPS 2026 conference offers resources on cybersecurity and data privacy best practices.Source 8 Focuses on practical tips for organizations attending in 2026.Source 8 Emphasizes plain-language guidance for maximum utility.Source 8

10

Global Campaign Targets Modbus PLCs in 70 Countries

Unknown actors, some from China, scanned 14,426 Modbus-enabled PLCs across 70 countries from Sep-Nov 2025, mainly US, France, Japan.Source 2 Campaign highlights risks to industrial control systems.Source 2 Continues pattern of rapid infrastructure targeting.Source 2

Latest Internet & Cybersecurity News | DeckBook AI