<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>News &#8211; Cyberwire Daily</title>
	<atom:link href="https://cyberwiredaily.com/category/news/feed/" rel="self" type="application/rss+xml" />
	<link>https://cyberwiredaily.com</link>
	<description></description>
	<lastBuildDate>Sun, 26 Apr 2026 14:13:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://cyberwiredaily.com/wp-content/uploads/2025/09/icon-150x150.png</url>
	<title>News &#8211; Cyberwire Daily</title>
	<link>https://cyberwiredaily.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions</title>
		<link>https://cyberwiredaily.com/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions/</link>
					<comments>https://cyberwiredaily.com/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Sun, 26 Apr 2026 14:13:31 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions/</guid>

					<description><![CDATA[The National Institute of Standards and Technology (NIST) has announced changes to the way it handles cybersecurity vulnerabilities and exposures (CVEs) listed in its National Vulnerability Database (NVD), stating it will only enrich those that fulfil certain conditions owing to an explosion in CVE submissions. &#8220;CVEs that do not meet those criteria will still be [...]]]></description>
										<content:encoded><![CDATA[
<p>The National Institute of Standards and Technology (NIST) has announced changes to the way it handles cybersecurity vulnerabilities and exposures (CVEs) listed in its National Vulnerability Database (NVD), stating it will only enrich those that fulfil certain conditions owing to an explosion in CVE submissions.<br />
&#8220;CVEs that do not meet those criteria will still be listed in the NVD but will not<br />
<br /><br />
<br /><a href="https://thehackernews.com/2026/04/nist-limits-cve-enrichment-after-263.html" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts</title>
		<link>https://cyberwiredaily.com/operation-poweroff-seizes-53-ddos-domains-exposes-3-million-criminal-accounts/</link>
					<comments>https://cyberwiredaily.com/operation-poweroff-seizes-53-ddos-domains-exposes-3-million-criminal-accounts/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Sun, 26 Apr 2026 10:11:20 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/operation-poweroff-seizes-53-ddos-domains-exposes-3-million-criminal-accounts/</guid>

					<description><![CDATA[An international law enforcement operation has taken down 53 domains and arrested four people in connection with commercial distributed denial-of-service (DDoS) operations that were used by more than 75,000 cybercriminals. The ongoing effort, dubbed Operation PowerOFF, disrupted access to the DDoS-for-hire services, took down the technical infrastructure supporting them, and obtained access to Source]]></description>
										<content:encoded><![CDATA[
<p>An international law enforcement operation has taken down 53 domains and arrested four people in connection with commercial distributed denial-of-service (DDoS) operations that were used by more than 75,000 cybercriminals.<br />
The ongoing effort, dubbed Operation PowerOFF, disrupted access to the DDoS-for-hire services, took down the technical infrastructure supporting them, and obtained access to<br />
<br /><br />
<br /><a href="https://thehackernews.com/2026/04/operation-poweroff-seizes-53-ddos.html" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/operation-poweroff-seizes-53-ddos-domains-exposes-3-million-criminal-accounts/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation</title>
		<link>https://cyberwiredaily.com/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation/</link>
					<comments>https://cyberwiredaily.com/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Sun, 26 Apr 2026 06:00:38 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation/</guid>

					<description><![CDATA[A recently disclosed high-severity security flaw in Apache ActiveMQ&#160;Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency&#160;(CISA). To that end, the agency&#160;has added the vulnerability, tracked&#160;as CVE-2026-34197 (CVSS score: 8.8), to its Known Exploited Vulnerabilities&#160;(KEV) catalog, requiring Federal Civilian Source]]></description>
										<content:encoded><![CDATA[
<p>A recently disclosed high-severity security flaw in Apache ActiveMQ&nbsp;Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency&nbsp;(CISA).<br />
To that end, the agency&nbsp;has added the vulnerability, tracked&nbsp;as CVE-2026-34197 (CVSS score: 8.8), to its Known Exploited Vulnerabilities&nbsp;(KEV) catalog, requiring Federal Civilian<br />
<br /><br />
<br /><a href="https://thehackernews.com/2026/04/apache-activemq-cve-2026-34197-added-to.html" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic</title>
		<link>https://cyberwiredaily.com/newly-discovered-powmix-botnet-hits-czech-workers-using-randomized-c2-traffic/</link>
					<comments>https://cyberwiredaily.com/newly-discovered-powmix-botnet-hits-czech-workers-using-randomized-c2-traffic/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Sat, 25 Apr 2026 22:41:36 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/newly-discovered-powmix-botnet-hits-czech-workers-using-randomized-c2-traffic/</guid>

					<description><![CDATA[Cybersecurity researchers have warned of an active malicious campaign that&#8217;s targeting the workforce in the Czech Republic with a previously undocumented botnet&#160;dubbed PowMix since at least December&#160;2025. &#8220;PowMix employs randomized command-and-control (C2) beaconing intervals, rather than persistent connection to the C2 server, to evade the network signature detections,&#8221; Cisco Talos Source]]></description>
										<content:encoded><![CDATA[
<p>Cybersecurity researchers have warned of an active malicious campaign that&#8217;s targeting the workforce in the Czech Republic with a previously undocumented botnet&nbsp;dubbed PowMix since at least December&nbsp;2025.<br />
&#8220;PowMix employs randomized command-and-control (C2) beaconing intervals, rather than persistent connection to the C2 server, to evade the network signature detections,&#8221; Cisco Talos<br />
<br /><br />
<br /><a href="https://thehackernews.com/2026/04/newly-discovered-powmix-botnet-hits.html" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/newly-discovered-powmix-botnet-hits-czech-workers-using-randomized-c2-traffic/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories</title>
		<link>https://cyberwiredaily.com/defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories/</link>
					<comments>https://cyberwiredaily.com/defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Sat, 25 Apr 2026 18:30:50 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories/</guid>

					<description><![CDATA[You know that feeling when you open your feed on a Thursday morning and it&#8217;s just&#8230; a lot? Yeah. This week delivered. We&#8217;ve got hackers getting creative in ways that are almost impressive if you ignore the whole &#8220;crime&#8221; part, ancient vulnerabilities somehow still ruining people&#8217;s days, and enough supply chain drama to fill a season of television [...]]]></description>
										<content:encoded><![CDATA[<p> <br />
</p>
<div id="articlebody">
<div class="separator" style="clear: both;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzTV_mwPjmV14aBlnHuLOX2yEZR6VGpmadgiPHtNBJV0KVNG_Oj2tnqE1cb3U9RhBXN-Mytte3jKs2n2dQwBhX2dYDETy5es4cGUkbW5bdIaV_hx8i3gWQhdaa7se1_Q8NY9t0q90EjUBNXt56_MxjT4YVV-R8D14jV3LequHu0llA84NnEK3PeU56Q54X/s1600/bull-main.jpg" style="clear: left; display: block; float: left; padding: 1em 0px; text-align: center;"></a></div>
<p>You know that feeling when you open your feed on a Thursday morning and it&#8217;s just&#8230; a lot? Yeah. This week delivered. We&#8217;ve got hackers getting creative in ways that are almost impressive if you ignore the whole &#8220;crime&#8221; part, ancient vulnerabilities somehow still ruining people&#8217;s days, and enough supply chain drama to fill a season of television nobody asked for.</p>
<p>Not all bad though. Some threat actors got exposed with receipts, a few platforms finally tightened things up, and there&#8217;s research in here that&#8217;s genuinely worth your time. Grab your coffee and keep scrolling.</p>
<p>That&#8217;s a wrap for this week. If anything here made you pause, good. Go check your patches, side-eye your dependencies, and maybe don&#8217;t trust that app just because it&#8217;s sitting in an official store. The basics still matter more than most people want to admit.</p>
<p>We&#8217;ll be back next Thursday with whatever fresh chaos the internet cooks up. Until then, stay sharp and keep your logs close. See you on the other side.</p>
</div>
<p><br />
<br /><a href="https://thehackernews.com/2026/04/threatsday-bulletin-17-year-old-excel.html" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution</title>
		<link>https://cyberwiredaily.com/cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution/</link>
					<comments>https://cyberwiredaily.com/cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Sat, 25 Apr 2026 14:29:24 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution/</guid>

					<description><![CDATA[Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution and allow an attacker to impersonate any user within the&#160;service. The details of the vulnerabilities are below&#160;&#8211; CVE-2026-20184 (CVSS score: 9.8) &#8211; An improper certificate validation in the integration of single sign-on [...]]]></description>
										<content:encoded><![CDATA[
<p>Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution and allow an attacker to impersonate any user within the&nbsp;service.<br />
The details of the vulnerabilities are below&nbsp;&#8211;</p>
<p>CVE-2026-20184 (CVSS score: 9.8) &#8211; An improper certificate validation in the integration of single sign-on (SSO)<br />
<br /><br />
<br /><a href="https://thehackernews.com/2026/04/cisco-patches-four-critical-identity.html" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks</title>
		<link>https://cyberwiredaily.com/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks/</link>
					<comments>https://cyberwiredaily.com/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Sat, 25 Apr 2026 10:26:05 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks/</guid>

					<description><![CDATA[A &#8220;novel&#8221; social engineering campaign has been observed abusing Obsidian, a cross-platform note-taking application, as an initial access vector to distribute a previously undocumented Windows remote access trojan called PHANTOMPULSE in attacks targeting individuals in the financial and cryptocurrency&#160;sectors. Dubbed REF6598 by Elastic Security Labs, the activity has been found to leverage Source]]></description>
										<content:encoded><![CDATA[
<p>A &#8220;novel&#8221; social engineering campaign has been observed abusing Obsidian, a cross-platform note-taking application, as an initial access vector to distribute a previously undocumented Windows remote access trojan called PHANTOMPULSE in attacks targeting individuals in the financial and cryptocurrency&nbsp;sectors.<br />
Dubbed REF6598 by Elastic Security Labs, the activity has been found to leverage<br />
<br /><br />
<br /><a href="https://thehackernews.com/2026/04/obsidian-plugin-abuse-delivers.html" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>UK Faces a Cyber ‘Perfect Storm’</title>
		<link>https://cyberwiredaily.com/uk-faces-a-cyber-perfect-storm/</link>
					<comments>https://cyberwiredaily.com/uk-faces-a-cyber-perfect-storm/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Sat, 25 Apr 2026 06:10:12 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/uk-faces-a-cyber-perfect-storm/</guid>

					<description><![CDATA[The UK faces a “perfect storm” for cybersecurity as the next decade will be defined by a combination of geopolitical tensions and high-seed technological evolution. Speaking at the tenth annual CYBERUK conference in Glasgow, Richard Horne, CEO of the UK’s National Cyber Security Centre (NCSC), said that the meeting of rapid technological change driven by [...]]]></description>
										<content:encoded><![CDATA[<p> <br />
</p>
<div id="layout-26d585ce-b516-45c5-aaec-57d89952af95" data-layout-id="2" data-edit-folder-name="text" data-index="0">
<p>The UK faces a “perfect storm” for cybersecurity as the next decade will be defined by a combination of geopolitical tensions and high-seed technological evolution.</p>
<p>Speaking at the tenth annual CYBERUK conference in Glasgow, Richard Horne, CEO of the UK’s National Cyber Security Centre (NCSC), said that the meeting of rapid technological change driven by developments in AI and geopolitical tensions are giving rise to a period of “tumultuous uncertainty”. </p>
<p>The NCSC had dealt with 204 “national significant” cyber incidents at the time of its last annual review, published in October 2026. Today, Horne said the number of incidents remained “fairly steady”.</p>
<h2><strong>Most Serious Cyber Threats Come from Nation States</strong></h2>
<p>Ransomware attacks continue to be the most prevalent threat to most firms. However, Horne warned that the majority of “nationally significant” threats the NCSC deals with originate directly from nation states.</p>
<p>Speaking to <em>Infosecurity, </em>Jamie Collier, lead threat intelligence advisor, (Europe), Google Threat Intelligence Group (GTIG), said the firm’s research shows that the UK is currently “navigating a complex and blended threat landscape where nation-state actors pursue very different strategic goals.” This he said, makes it difficult to compare them side-by-side.</p>
<p>In his speech at CYBERUK, Horne outlined how Russia, China and Iran continue to target both UK firms and individuals with their different tactics and objectives.</p>
<p>He noted that China’s intelligence and military agencies now display an “eye-watering level of sophistication” in their cyber operations.</p>
<p>In August 2025, the NCSC published a joint advisory alongside twelve allied agencies publicly linking three China-based companies to a global campaign targeting critical networks, overlapping with what industry tracks as Salt Typhoon.</p>
<p>China-nexus activity is often quieter and persistent, especially compared to the likes of Russian threat actors. They have typically moved away from traditional targets to focus on edge infrastructure like routers and VPNs, explained Collier.</p>
<p>Meanwhile, Iran is “almost certainly” using cyber activities to support the repression of British individuals on our streets who are seen as a threat to the regime, Horne said.</p>
<p>The NCSC has previously warned about an increase in targeted attacks against individuals using social media messaging apps.</p>
<p>Martin Riley, CTO at cybersecurity services firm Bridewell, told <em>Infosecurity </em>that Iran is “the shifting piece.”</p>
<p>The Handala wiper activity in March, which compromised Stryker&#8217;s Microsoft Intune environment and remotely wiped devices at a key UK NHS supplier, “shows the direction of travel,” Riley noted.</p>
<p>“UK organizations should expect more direct Iranian or Iran-aligned targeting in the months ahead, not less,” he added.   </p>
<p>Regarding Russia, Horne’s analysis noted that cyber lessons are being learned in the theatre of war with Ukraine.</p>
<p>“The tactics and techniques honed in conflict are now being directed at states it considers hostile,” Horne said.</p>
<p>The NCSC and its partners, including the National Protective Security Authority, are observing sustained Russian hybrid activity targeting assets across the UK and Europe.</p>
<p>Collier noted, “Russia remains the most visible and disruptive threat, characterized by a mix of sophisticated espionage and a surge in pro-Russia hacktivist activity.”</p>
<p>While this is cause for concern, Bridewell’s data found that the current Russian cyber effort remains heavily concentrated on Ukraine and on espionage against government and policy targets, with pro-Russia hacktivist noise on the margins.</p>
<p>“Direct targeting of UK operational technology (OT) and critical national infrastructure (CNI) by Russian state actors is not what we are seeing in volume right now,” said Bridewell’s Riley.</p>
<p>GTIG’s Collier said their analysis shows Russia move toward tactical, frontline objectives.</p>
<p>“This includes targeting the mobile devices and battlefield applications used by individual soldiers to gain immediate military advantages. This shows a Russian cyber apparatus that has become much more disciplined and integrated into traditional military operations,” he said.</p>
<h2><strong>UK Preparedness Under the Spotlight </strong></h2>
<p>The readiness of UK organizations against sustained nation-state attacks is uncertain. Anthony Young, CEO at Bridewell cautioned that the majority or businesses are “not well prepared.”</p>
<p>“Most organizations are still struggling to get basic security controls in place and have full visibility across their estate. At a time of heightened security budgets are being squeezed like never before therefore CISO’s are having to do more with less and most are still starting from a relatively low level of maturity,” he told <em>Infosecurity</em>.</p>
<p>Horne urged for a “cultural shift” within organizations to prepared for cyber risks, calling for everyone “whether they sit on the board or the IT help desk” to be part of the cybersecurity mission.</p>
<p>Young said, “Execs across organizations need to start to stand up, stop putting lip service to cybersecurity and actually invest for the long term.”</p>
<p>If a nation state was to undertake a sustained attack on the UK today, Young said he would be “very worried.”</p>
<p>“We have the right people and skills to be able to respond fast as a country but if we focused on actually improving cyber properly as a country we would be in a lot better position,&#8221; Young concluded.</p>
<p>Meanwhile, Rob Demain, CEO, e2e-assure cautioned that if organizations don&#8217;t evolve how they are detecting and responding to threats over the next 12 months, then they will soon become “significantly under prepared.”</p>
<p>Collier said for cybersecurity leaders, the most critical shift is moving from a prevention-only mindset to a resilience mindset.</p>
<p>“Organizations have to assume adversaries can gain initial access and focus on making their environment as difficult as possible for intruders to navigate,” he said.</p>
<h2><strong>AI, a Cause for Concern</strong></h2>
<p>Following the release of Anthropic’s Claude Mythos frontier AI model, which promises to identify and fix software vulnerabilities at speed, the UK government sent an open letter to business leaders urging them to plan for such AI models to rapidly increase over the next year.</p>
<p>The letter also encouraged businesses to take cybersecurity seriously and deploy cyber hygiene methods.</p>
<p>During CYBERUK, Horne said, “Frontier AI is rapidly enabling discovery and exploitation of existing vulnerabilities at scale, illustrating how quickly it will expose where fundamentals of cyber security are still to be addressed.”</p>
<p>Demain highlighted that zero-day attacks are becoming more common and real across all business sizes and industries as a result of advancements in AI.</p>
<p>Although the threats and technologies are changing, we still need to ensure the basics are correct, he added.</p>
<p>“Basics such as full visibility across all environments, 24/7 monitoring, and correct technological configuration are still some of the easiest ways to remain a hard target for threat actors, even with the threats from AI looming,” he said.</p>
</div>
<p><br />
<br /><a href="https://www.infosecurity-magazine.com/news/uk-faces-a-cyber-perfect-storm-ncsc/" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/uk-faces-a-cyber-perfect-storm/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign</title>
		<link>https://cyberwiredaily.com/uac-0247-targets-ukrainian-clinics-and-government-in-data-theft-malware-campaign/</link>
					<comments>https://cyberwiredaily.com/uac-0247-targets-ukrainian-clinics-and-government-in-data-theft-malware-campaign/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Sat, 25 Apr 2026 06:07:54 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/uac-0247-targets-ukrainian-clinics-and-government-in-data-theft-malware-campaign/</guid>

					<description><![CDATA[The Computer Emergencies Response Team of Ukraine (CERT-UA)&#160;has disclosed details of a new&#160;campaign that has&#160;targeted governments and municipal healthcare institutions, mainly clinics and emergency hospitals, to deliver malware capable of stealing sensitive data from Chromium-based web browsers and&#160;WhatsApp. The activity,&#160;which was&#160;observed between March and April Source]]></description>
										<content:encoded><![CDATA[
<p>The Computer Emergencies Response Team of Ukraine (CERT-UA)&nbsp;has disclosed details of a new&nbsp;campaign that has&nbsp;targeted governments and municipal healthcare institutions, mainly clinics and emergency hospitals, to deliver malware capable of stealing sensitive data from Chromium-based web browsers and&nbsp;WhatsApp.<br />
The activity,&nbsp;which was&nbsp;observed between March and April<br />
<br /><br />
<br /><a href="https://thehackernews.com/2026/04/uac-0247-targets-ukrainian-clinics-and.html" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/uac-0247-targets-ukrainian-clinics-and-government-in-data-theft-malware-campaign/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI Rush is Reviving Old Cybersecurity Mistakes, Mandiant VP Warns</title>
		<link>https://cyberwiredaily.com/ai-rush-is-reviving-old-cybersecurity-mistakes-mandiant-vp-warns/</link>
					<comments>https://cyberwiredaily.com/ai-rush-is-reviving-old-cybersecurity-mistakes-mandiant-vp-warns/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Fri, 24 Apr 2026 18:43:29 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/ai-rush-is-reviving-old-cybersecurity-mistakes-mandiant-vp-warns/</guid>

					<description><![CDATA[The rush to adopt AI in enterprise environments is not only creating new security vulnerabilities, but is also reviving old security failures, a top Mandiant executive has warned. Speaking to Infosecurity during Google Cloud Next 26, Jurgen Kutscher, VP of Mandiant Consulting, part of Google Cloud, said that AI deployment in enterprises is often accompanied [...]]]></description>
										<content:encoded><![CDATA[<p> <br />
</p>
<div id="layout-29ac743b-07c7-44a4-a862-323d69715fc6" data-layout-id="2" data-edit-folder-name="text" data-index="0">
<p>The rush to adopt AI in enterprise environments is not only creating new security vulnerabilities, but is also reviving old security failures, a top Mandiant executive has warned.</p>
<p>Speaking to <em>Infosecurity</em> during Google Cloud Next 26, Jurgen Kutscher, VP of Mandiant Consulting, part of Google Cloud, said that AI deployment in enterprises is often accompanied by a neglect of basic security controls.</p>
<p>“A lot of the old problems are new again,” Kutscher said. “We’ve seen enterprises really worried about new AI threats like large language model poisoning while forgetting the most basic security controls.”</p>
<h2><strong>Mandiant Red Team Reveals Cybersecurity Failings </strong></h2>
<p>Kutscher said Mandiant’s red team has uncovered real security failures caused by this mismanagement during simulated real‑world attacks, in which testers adopt the tactics of genuine adversaries to probe organizations’ defenses.</p>
<p>During red-team engagements, he has seen AI-enabled environments where an attacker could change data classifications, allowing them to bypass protections like data loss protection (DLP) solutions.</p>
<p>Furthermore, Kutscher was “surprised” to find even simple mistakes such as unencrypted communication streams.</p>
<p>“For instance, we observed an unencrypted communication stream between the AI and the browser when working with a financial company,” he said, underscoring how basic hygiene was being overlooked.</p>
<p>In multiple engagements, Mandiant red teamers were able to social-engineer initial access and then rely on the AI to perform follow-on actions, including exfiltration and policy changes.</p>
<p>“Once we&#8217;re inside, we&#8217;ve had the AI do the rest for us, including data theft and everything. And I’m talking about authorized AI deployments, not event shadow AI cases, where employees have deployed AI workflows without the company’s oversight,” Kutscher said.</p>
<p>Organizations should build AI security governance processes as soon as possible.  </p>
<p>He emphasized that creating policies and governance is easier than cleaning up uncontrolled AI usage after the fact. He recommended revisiting secure architecture and performing red-team validation to ensure critical assets are truly segmented.</p>
<p>While recognizing AI’s power for defense, Kutscher urged CISOs not to assume AI adoption absolves them of basic cybersecurity responsibilities.</p>
<p>“It’s possible that these mistakes partly come from the fact that CISOs aren’t always involved in the deployment of AI workflows, among many other reasons, I don’t want to speculate, but the lack of basic security controls around AI workflow deployments is there and it’s a significant risk,” he concluded.</p>
</div>
<p><br />
<br /><a href="https://www.infosecurity-magazine.com/news/ai-old-cybersecurity-mistakes/" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/ai-rush-is-reviving-old-cybersecurity-mistakes-mandiant-vp-warns/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
