{"data":[{"id":3171287,"title":"Friday Squid Blogging: Squid Overfishing in the South Pacific","link":"https://www.schneier.com/blog/archives/2026/04/friday-squid-blogging-squid-overfishing-in-the-south-pacific.html","summary":"Regulation is hard: The South Pacific Regional Fisheries Management Organization (SPRFMO) oversees fishing across roughly 59 million square kilometers (22 mi...","source":"Schneier on Security","category":"General","vendor":null,"published_at":"2026-04-10T21:03:27.000Z","created_at":"2026-04-10 21:07:37","sector":"Energy","mitre_techniques":null,"iocs":null,"vendors_all":null,"dedup_hash":"16121c839fffcf97","entities_processed":1,"tlp":"WHITE"},{"id":3175502,"title":"Staypuft, Claude, One Pixel, deepfakes, Raccoon, BOFH, Satoshi Nakamoto, Josh Marpet. - SWN #571","link":"https://www.scworld.com/podcast-segment/14996-staypuft-claude-one-pixel-deepfakes-raccoon-bofh-satoshi-nakamoto-josh-marpet-swn-571","summary":"","source":"SC Media","category":"General","vendor":null,"published_at":"2026-04-10T21:00:00.000Z","created_at":"2026-04-10 21:32:31","sector":null,"mitre_techniques":null,"iocs":null,"vendors_all":null,"dedup_hash":"b1a84fe4d0979667","entities_processed":1,"tlp":"WHITE"},{"id":3175503,"title":"Intensified robocall clampdown mulled by FCC","link":"https://www.scworld.com/brief/intensified-robocall-clampdown-mulled-by-fcc","summary":"The Federal Communications Commission has unveiled a proposed rule pushing for more stringent anti-robocall measures on top of already available know your cu...","source":"SC Media","category":"General","vendor":null,"published_at":"2026-04-10T20:38:20.000Z","created_at":"2026-04-10 21:32:31","sector":"Government","mitre_techniques":null,"iocs":null,"vendors_all":null,"dedup_hash":"add7ab711c54daee","entities_processed":1,"tlp":"WHITE"},{"id":3175504,"title":"US Treasury to offer free cybersecurity intelligence to crypto firms","link":"https://www.scworld.com/brief/us-treasury-to-offer-free-cybersecurity-intelligence-to-crypto-firms","summary":"The U.S.","source":"SC Media","category":"General","vendor":"Intel","published_at":"2026-04-10T20:37:23.000Z","created_at":"2026-04-10 21:32:31","sector":"Financial","mitre_techniques":null,"iocs":null,"vendors_all":["Intel"],"dedup_hash":"0cd71f10ef25602e","entities_processed":1,"tlp":"WHITE"},{"id":3175505,"title":"All Brazilians potentially impacted by alleged breach of Experian subsidiary","link":"https://www.scworld.com/brief/all-brazilians-potentially-impacted-by-alleged-breach-of-experian-subsidiary","summary":"Cybernews reports that Serasa Experian, the Brazilian subsidiary of credit risk and fraud prevention firm Experian, had 1.8 TB of data belonging to 223 milli...","source":"SC Media","category":"Data Breach","vendor":null,"published_at":"2026-04-10T20:36:14.000Z","created_at":"2026-04-10 21:32:31","sector":"Transportation","mitre_techniques":null,"iocs":null,"vendors_all":null,"dedup_hash":"95312b86c4076d43","entities_processed":1,"tlp":"WHITE"},{"id":3165052,"title":"Android Banking Trojan Linked to Cambodia Scam Compounds Hits 21 Countries","link":"https://hackread.com/android-banking-trojan-cambodia-scam-compounds/","summary":"Android banking trojan linked to Cambodia scam compounds uses forced labour to target users in 21 countries, bypassing security to steal funds.","source":"HackRead","category":"Malware","vendor":"Google","published_at":"2026-04-10T20:32:33.000Z","created_at":"2026-04-10 20:35:32","sector":"Financial","mitre_techniques":null,"iocs":null,"vendors_all":["Google"],"dedup_hash":"6a186b99230d2bb9","entities_processed":1,"tlp":"WHITE"},{"id":3175506,"title":"EngageLab SDK bug threatened expansive Android crypto wallet compromise","link":"https://www.scworld.com/brief/engagelab-sdk-bug-threatened-expansive-android-crypto-wallet-compromise","summary":"Popular third-party Android software development kit EngageLab SDK has been impacted by an already addressed intent redirection flaw, which could have been e...","source":"SC Media","category":"General","vendor":"Google","published_at":"2026-04-10T20:30:32.000Z","created_at":"2026-04-10 21:32:31","sector":"Financial","mitre_techniques":null,"iocs":null,"vendors_all":["Google"],"dedup_hash":"8be7ec660ae5009e","entities_processed":1,"tlp":"WHITE"},{"id":3175507,"title":"High-value crypto asset theft sought by novel notnullOSX macOS malware","link":"https://www.scworld.com/brief/high-value-crypto-asset-theft-sought-by-novel-notnullosx-macos-malware","summary":"Attacks with the nascent notnullOSX malware for macOS have been targeting cryptocurrency wallets containing over $10,000 in Taiwan, Vietnam, and Spain as par...","source":"SC Media","category":"Campaigns","vendor":"Apple","published_at":"2026-04-10T20:29:04.000Z","created_at":"2026-04-10 21:32:31","sector":"Financial","mitre_techniques":null,"iocs":null,"vendors_all":["Apple"],"dedup_hash":"ef9c8e264c2c7e86","entities_processed":1,"tlp":"WHITE"},{"id":3175508,"title":"Advanced STX RAT sets sights on financial services industry","link":"https://www.scworld.com/brief/advanced-stx-rat-sets-sights-on-financial-services-industry","summary":"Advanced STX RAT sets sights on financial services industry Infosecurity Magazine reports that highly sophisticated tactics have been employed to covertly de...","source":"SC Media","category":"TTPs","vendor":null,"published_at":"2026-04-10T20:28:39.000Z","created_at":"2026-04-10 21:32:31","sector":"Financial","mitre_techniques":null,"iocs":null,"vendors_all":null,"dedup_hash":"6ed5e296b50ff9c3","entities_processed":1,"tlp":"WHITE"},{"id":3175509,"title":"Hacker faux pas uncloaks North Korean IT worker scheme","link":"https://www.scworld.com/brief/hacker-faux-pas-uncloaks-north-korean-it-worker-scheme","summary":"North Korea had one of its IT worker scams' secrets unravel after a hacker inadvertently executed information-stealing malware on their own computer, accordi...","source":"SC Media","category":"Malware","vendor":null,"published_at":"2026-04-10T20:26:58.000Z","created_at":"2026-04-10 21:32:31","sector":null,"mitre_techniques":null,"iocs":null,"vendors_all":null,"dedup_hash":"a329da3beb3eda02","entities_processed":1,"tlp":"WHITE"},{"id":3175510,"title":"Report: US accounts for most PLCs subjected to Iranian targeting","link":"https://www.scworld.com/brief/report-us-accounts-for-most-plcs-subjected-to-iranian-targeting","summary":"Almost 3,900, or nearly 75%, of 5,219 internet-exposed Rockwell Automation/Allen-Bradley programmable logic controllers used in critical infrastructure entit...","source":"SC Media","category":"General","vendor":null,"published_at":"2026-04-10T20:25:58.000Z","created_at":"2026-04-10 21:32:31","sector":"Manufacturing","mitre_techniques":null,"iocs":null,"vendors_all":null,"dedup_hash":"3f2c11406c701ea0","entities_processed":1,"tlp":"WHITE"},{"id":3165388,"title":"Chrome 146 introduces device bound session credentials to combat info-stealing malware","link":"https://www.scworld.com/brief/chrome-146-introduces-device-bound-session-credentials-to-combat-info-stealing-malware","summary":"DBSC works by cryptographically linking a user's session to their hardware, utilizing the Trusted Platform Module (TPM) on Windows.","source":"SC Media","category":"Malware","vendor":"Microsoft","published_at":"2026-04-10T20:23:24.000Z","created_at":"2026-04-10 20:35:33","sector":"Financial","mitre_techniques":null,"iocs":null,"vendors_all":["Microsoft","Google"],"dedup_hash":"69b58280a9a6a384","entities_processed":1,"tlp":"WHITE"},{"id":3165389,"title":"Apiiro launches CLI to integrate application security into AI development workflows","link":"https://www.scworld.com/brief/apiiro-launches-cli-to-integrate-application-security-into-ai-development-workflows","summary":"Apiiro argues that current security workflows are reactive, relying on scanning and remediation after code is written, a model unsustainable with AI's speed.","source":"SC Media","category":"General","vendor":null,"published_at":"2026-04-10T20:09:36.000Z","created_at":"2026-04-10 20:35:33","sector":"Media","mitre_techniques":null,"iocs":null,"vendors_all":null,"dedup_hash":"a85ba81e9e8f5fa3","entities_processed":1,"tlp":"WHITE"},{"id":3165390,"title":"Global crypto scam disrupted, $12 million recovered in Operation Atlantic","link":"https://www.scworld.com/brief/global-crypto-scam-disrupted-12-million-recovered-in-operation-atlantic","summary":"The week-long initiative, named Operation Atlantic, was a joint effort involving the US Secret Service, the UK National Crime Agency, and Canadian police for...","source":"SC Media","category":"Campaigns","vendor":null,"published_at":"2026-04-10T20:09:02.000Z","created_at":"2026-04-10 20:35:33","sector":"Financial","mitre_techniques":null,"iocs":null,"vendors_all":null,"dedup_hash":"7636219f1cd34bd1","entities_processed":1,"tlp":"WHITE"},{"id":3157074,"title":"Commerce setting up new AI export regime to push adoption of ‘American AI’ abroad","link":"https://cyberscoop.com/commerce-ai-export-regime-promotes-american-ai-adoption-abroad/","summary":"The department is looking to create a “menu of priority AI export packages that the U.S.","source":"Cyberscoop","category":"General","vendor":null,"published_at":"2026-04-10T19:40:00.000Z","created_at":"2026-04-10 19:50:33","sector":"Government","mitre_techniques":null,"iocs":null,"vendors_all":null,"dedup_hash":"7b4606a91a18eade","entities_processed":1,"tlp":"WHITE"},{"id":3154009,"title":"Metasploit Wrap-Up 04/10/2026","link":"https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-04-10-2026","summary":"Speedup Improvements of MSFVenom & New Modules This week, we have added new modules to Metasploit Framework targeting Cisco Catalyst SD-WAN controllers and o...","source":"Rapid7 Blog","category":"General","vendor":"Microsoft","published_at":"2026-04-10T19:11:43.000Z","created_at":"2026-04-10 19:22:24","sector":"Transportation","mitre_techniques":null,"iocs":null,"vendors_all":["Microsoft","Cisco","Rapid7"],"dedup_hash":"2da4d7459a95c584","entities_processed":1,"tlp":"WHITE"},{"id":3148840,"title":"Old Docker authorization bypass pops up despite previous patch","link":"https://www.csoonline.com/article/4157405/old-docker-authorization-bypass-pops-up-despite-previous-patch.html","summary":"Researchers warn about a new vulnerability that allows attackers to bypass authorization plug-ins in Docker Engine and gain root-level access to host systems...","source":"CSO Online","category":"CVE","vendor":"Docker","published_at":"2026-04-10T18:50:59.000Z","created_at":"2026-04-10 18:52:24","sector":"Media","mitre_techniques":null,"iocs":{"cves":["CVE-2026-34040"]},"vendors_all":["Docker"],"dedup_hash":"78eec1afcfa8bcee","entities_processed":1,"tlp":"WHITE"},{"id":3141656,"title":"Senator launches inquiry into 8 tech giants for failures to adequately report CSAM","link":"https://therecord.media/senator-launches-inquiry-into-tech-giants-csam","summary":"The inquiry follows reports from the National Center for Missing and Exploited Children (NCMEC) that allege the tech giants are deficient in their reporting ...","source":"The Record","category":"General","vendor":null,"published_at":"2026-04-10T18:05:00.000Z","created_at":"2026-04-10 18:15:17","sector":"Financial","mitre_techniques":null,"iocs":null,"vendors_all":null,"dedup_hash":"f18f7fffea884772","entities_processed":1,"tlp":"WHITE"},{"id":3142974,"title":"500 Tbps of capacity: 16 years of scaling our global network","link":"https://blog.cloudflare.com/500-tbps-of-capacity/","summary":"Cloudflare’s global network has officially crossed 500 Tbps of external capacity, enough to route more than 20% of the web and absorb the largest DDoS attack...","source":"Cloudflare Blog","category":"DDoS","vendor":"Cloudflare","published_at":"2026-04-10T18:00:05.000Z","created_at":"2026-04-10 18:19:19","sector":null,"mitre_techniques":[{"id":"T1498","name":"Network Denial of Service","tactic":"Impact"}],"iocs":null,"vendors_all":["Cloudflare"],"dedup_hash":"3ebd9c3603a49812","entities_processed":1,"tlp":"WHITE"},{"id":3144129,"title":"Blind spots at scale: The hidden risks of identity visibility gaps and shadow AI","link":"https://www.scworld.com/resource/blind-spots-at-scale-the-hidden-risks-of-identity-visibility-gaps-and-shadow-ai","summary":"Why legacy IAM systems can't properly detect or manage NHIs and shadow AI.","source":"SC Media","category":"General","vendor":null,"published_at":"2026-04-10T17:50:06.000Z","created_at":"2026-04-10 18:30:15","sector":null,"mitre_techniques":null,"iocs":null,"vendors_all":null,"dedup_hash":"120c175a41222d8d","entities_processed":1,"tlp":"WHITE"}],"pagination":{"page":1,"limit":20,"total":3061,"pages":154}}