LiveThreat Breach Watch

BREACH WATCH

Live threat intelligence from multiple sources. Updated every 6 hours.

Try 5 Vendors for Free →📡 RSS Feed
57
Last 24h
272
Last 7 Days
17
Critical (7d)
🔍
Showing 21 of 3460 results
ADVISORYLIVETHREAT BRIEF🔑
LIVETHREAT BRIEFNCSC Recommends Passkeys Over Traditional MFA, Boosting Authentication Security

The UK NCSC now advises all services to adopt passkeys (FIDO2) wherever possible, citing superior resistance to phishing, credential reuse, and session hijacking. This shift has direct implications for third‑party risk management, urging organizations to verify that their vendors support passkey authentication.

🏭 Technology & SaaS
Informational · Apr 23, 2026 · NCSC UK
Read Full Intelligence Brief →
ADVISORYLIVETHREAT BRIEF👤
LIVETHREAT BRIEFCisco Mulls $250M‑$350M Acquisition of Non‑Human Identity Startup Astrix Security

Cisco is in talks to buy Astrix Security, a startup that secures AI‑driven, non‑human identities. The deal, valued at $250‑$350 million, expands Cisco’s IAM portfolio and introduces new supply‑chain considerations for enterprises relying on Cisco security products.

🏭 Technology & SaaS
Medium · Apr 23, 2026 · DataBreachToday
Read Full Intelligence Brief →
THREAT INTELLIVETHREAT BRIEF🏛️
LIVETHREAT BRIEFRussian Nation‑State Actors Drive Surge in UK Cyber Incidents, NCSC Reports

Nation-State Hits Now Comprise Majority of Serious Incidents Probed by Government British intelligence officials said they investigate about four major incidents per week, with the majority involving nation-state actors. Officials said the shape and scope of how cyberattacks are being wielded by the nation's adversaries continues to change as fast as the technology evolves.

Informational · Apr 23, 2026 · DataBreachToday
Read Full Intelligence Brief →
BREACHLIVETHREAT BRIEF👤
LIVETHREAT BRIEFUnauthorized Discord Group Accesses Anthropic’s Claude Mythos Preview Model

A private Discord community leveraged stolen contractor credentials and leaked endpoint information to gain unauthorized access to Anthropic’s Claude Mythos preview AI model. The breach underscores supply‑chain credential risks for high‑impact AI services and prompts immediate third‑party risk reviews.

🏭 Technology & SaaS⚡ Data Exfiltration🎯 Stolen Credentials🔒 Intellectual Property
High · Apr 23, 2026 · DataBreachToday
Read Full Intelligence Brief →
ADVISORYLIVETHREAT BRIEF☁️
LIVETHREAT BRIEFMerck Partners with Google Cloud in $1 B Agentic AI Deal to Transform Pharma Operations

Merck has signed a multi‑year, up‑to‑$1 billion agreement with Google Cloud to embed the Gemini Enterprise agentic‑AI platform across its drug‑development lifecycle. The collaboration widens the third‑party risk surface, introducing critical cloud‑AI services into core pharmaceutical processes.

🏭 Healthcare & Life Sciences
Informational · Apr 23, 2026 · DataBreachToday
Read Full Intelligence Brief →
ADVISORYLIVETHREAT BRIEF🤖
LIVETHREAT BRIEFAI‑Driven Threat Landscape Spurs Call for Enhanced Global Threat Intelligence

TrendAI’s Tom Kellermann warns that nation‑state actors and cybercriminals are now using autonomous, AI‑powered attack chains that operate at machine speed, demanding AI‑augmented telemetry and global threat intelligence for effective third‑party risk management.

🏭 Technology & SaaS
Informational · Apr 23, 2026 · DataBreachToday
Read Full Intelligence Brief →
BREACHLIVETHREAT BRIEF🏦
LIVETHREAT BRIEFRockstar Games Breach Leaks Internal Revenue Figures, Not Sensitive Player Data

Attackers accessed Rockstar Games’ internal network, leaking limited player data and revealing that GTA Online generates roughly $0.5 billion annually while Red Dead Redemption does not. The breach highlights financial‑data exposure risks for entertainment vendors.

🏭 Media & Entertainment⚡ Data Exfiltration
High · Apr 22, 2026 · Graham Cluley
Read Full Intelligence Brief →
THREAT INTELLIVETHREAT BRIEF☁️
LIVETHREAT BRIEFChinese Smart Home Cameras Expose Users to Data Harvesting via Hard‑Coded Credentials and Hong Kong Cloud Relays

SentinelOne Labs uncovered that low‑cost Chinese video doorbells and security cameras ship with hard‑coded root passwords and route video streams to servers in Hong Kong and mainland China. The opaque ownership structure and lack of firmware support create a supply‑chain risk that can compromise corporate networks and violate data‑residency regulations.

🎯 Vulnerability Exploit
High · Apr 22, 2026 · SentinelOne Labs
Read Full Intelligence Brief →
VULNERABILITYLIVETHREAT BRIEF📱
LIVETHREAT BRIEFApple Issues Out‑of‑Band Patch for iOS Notification Data Retention Bug (CVE‑2026‑28950)

Apple released emergency updates to close CVE‑2026‑28950, a flaw that allowed deleted notifications to persist on iOS devices. The issue could expose sensitive message content, making it a priority for organizations with BYOD or iOS‑dependent workflows.

⚡ Data Exfiltration🎯 Vulnerability Exploit
High · Apr 22, 2026 · BleepingComputer
Read Full Intelligence Brief →
VULNERABILITYLIVETHREAT BRIEF📡
LIVETHREAT BRIEFCritical RCE in D‑Link DIR‑823X Routers (CVE‑2025‑29635) Fuels New Mirai Botnet Campaign

A command‑injection flaw (CVE‑2025‑29635) in end‑of‑life D‑Link DIR‑823X routers is being actively exploited by a Mirai‑derived botnet. The vulnerability enables remote code execution, allowing attackers to enlist routers into a DDoS‑capable network, posing a supply‑chain risk for organisations that still run legacy networking gear.

🏭 Telecommunications🎯 Vulnerability Exploit
High · Apr 22, 2026 · BleepingComputer
Read Full Intelligence Brief →
ADVISORYLIVETHREAT BRIEF🤖
LIVETHREAT BRIEFGoogle Launches Workspace Intelligence AI Feature with Built‑In Privacy Controls

Google introduced Workspace Intelligence, an AI layer that reads Workspace content to provide context‑aware assistance while promising that data stays within the organization and is not used for external model training. TPRM teams must evaluate new data flows, regional storage options, and DLP integration.

🏭 Technology & SaaS
Low · Apr 22, 2026 · Help Net Security
Read Full Intelligence Brief →
ADVISORYLIVETHREAT BRIEF🤖
LIVETHREAT BRIEFVonage Partners with Girls Who Code to Demonstrate Responsible AI Practices

Vonage has teamed up with Girls Who Code to create a responsible‑AI talent pipeline, offering workshops and mentorship that emphasize bias mitigation, transparency, and ethical governance. The program signals to customers and regulators that Vonage is proactively managing AI risk, a factor TPRM teams must now evaluate in vendor assessments.

🏭 Telecommunications
Informational · Apr 22, 2026 · TechRepublic Security
Read Full Intelligence Brief →
RANSOMWARELIVETHREAT BRIEF💀
LIVETHREAT BRIEFKyber Ransomware Deploys Post‑Quantum Encryption Against Windows and VMware ESXi Servers, Hits Defense Contractor

Rapid7 identified two Kyber ransomware variants that encrypt Windows file servers and VMware ESXi hosts using post‑quantum Kyber1024 and classic RSA‑4096. The campaign, linked to a multi‑billion‑dollar U.S. defense contractor, deletes backups and disables services, raising supply‑chain risk for critical‑infrastructure vendors.

🏭 Government & Public Sector⚡ Ransomware🎯 Malware
High · Apr 22, 2026 · BleepingComputer
Read Full Intelligence Brief →
VULNERABILITYLIVETHREAT BRIEF🐛
LIVETHREAT BRIEFMozilla Patches 271 Firefox Vulnerabilities Discovered via Anthropic’s Mythos AI

Mozilla released Firefox 150, fixing 271 security bugs identified by Anthropic’s Mythos AI. The rapid AI‑driven discovery underscores the need for vigilant third‑party patch management across all industries that rely on the browser.

🏭 Technology & SaaS🎯 Vulnerability Exploit
High · Apr 22, 2026 · TechRepublic Security
Read Full Intelligence Brief →
THREAT INTELLIVETHREAT BRIEF🎣
LIVETHREAT BRIEFSIM Farm‑as‑a‑Service Enables Global Scam‑Text Campaigns, Threatening Consumers and Enterprises

Criminals are leasing massive SIM‑farm infrastructures to launch automated phishing, smishing and robocall attacks that appear to come from local numbers. The abuse of legitimate telecom resources creates a hidden, high‑volume threat vector that can compromise personal data and financial assets, making it a critical concern for third‑party risk managers.

🏭 Telecommunications🎯 Third-Party Dependency
High · Apr 22, 2026 · ZDNet Security
Read Full Intelligence Brief →
THREAT INTELLIVETHREAT BRIEF🌩️
LIVETHREAT BRIEFDDoS Wave Hits Mastodon After Bluesky Outage, Causing Hours of Service Disruption

Mastodon experienced a major DDoS attack on April 20 2026, following a similar incident on Bluesky. The outage lasted several hours before mitigation restored service. Third‑party risk managers should reassess DDoS resilience of external SaaS and API providers.

🏭 Media & Entertainment🎯 Malware
High · Apr 22, 2026 · Security Affairs
Read Full Intelligence Brief →
BREACHLIVETHREAT BRIEF👤
LIVETHREAT BRIEFDiscord‑Linked Threat Group Accesses Anthropic Claude Mythos AI Model in Vendor Breach

Anthropic reports that a Discord‑based threat group breached a vendor integration and accessed its Claude Mythos AI model, raising concerns over intellectual‑property theft and third‑party access controls for AI SaaS providers.

🏭 Technology & SaaS⚡ Data Exfiltration🎯 Third-Party Dependency
High · Apr 22, 2026 · HackRead
Read Full Intelligence Brief →
THREAT INTELLIVETHREAT BRIEF🔗
LIVETHREAT BRIEFMalicious Docker Images and VS Code Extensions Compromise Checkmarx KICS Supply Chain

Threat actors hijacked the official Checkmarx KICS Docker Hub repository and VS Code Marketplace, overwriting legitimate images and publishing malicious extensions. Organizations using KICS risk injecting malware into CI/CD pipelines, making this a critical supply‑chain concern for third‑party risk managers.

🏭 Technology & SaaS🎯 Third-Party Dependency
High · Apr 22, 2026 · The Hacker News
Read Full Intelligence Brief →
ADVISORYLIVETHREAT BRIEF🤖
LIVETHREAT BRIEFGoogle Adds AI‑Driven Auto Browse, Skills, and Gemini Summary to Chrome Enterprise, Expanding Automation and Introducing New Security Controls

Google rolled out three AI capabilities—Auto Browse, Skills, and Gemini Summary—to Chrome Enterprise, enabling autonomous browser actions and reusable prompts while giving IT teams new visibility and controls over AI usage. TPRM teams must assess data‑flow impacts and configure safeguards.

🏭 Technology & SaaS
Informational · Apr 22, 2026 · ZDNet Security
Read Full Intelligence Brief →
THREAT INTELLIVETHREAT BRIEF🎣
LIVETHREAT BRIEFApple Phishing Campaign Uses Fake $899 iPhone Purchase Alert to Harvest Credentials

A new phishing campaign pretends to be an Apple purchase confirmation for a $899 iPhone, tricking recipients into clicking malicious links that harvest Apple ID credentials. The attack threatens enterprises that rely on Apple IDs for device management and SSO, making it a high‑priority TPRM concern.

🎯 Phishing
High · Apr 22, 2026 · TechRepublic Security
Read Full Intelligence Brief →
THREAT INTELLIVETHREAT BRIEF👤
LIVETHREAT BRIEFHackers Impersonate IT Help Desk on Microsoft Teams to Gain Remote Access and Steal Data

Threat actors are abusing Microsoft Teams to pose as IT support, tricking users into revealing credentials or installing remote‑access tools. The resulting lateral movement can lead to corporate data exfiltration, making it a critical concern for third‑party risk managers.

🎯 Phishing
High · Apr 22, 2026 · TechRepublic Security
Read Full Intelligence Brief →
Page 1 of 165

Know When Your Vendors Are Breached

LiveThreat monitors this intelligence against your vendor portfolio and alerts you automatically.

Try 5 Vendors for Free →📡 Subscribe via RSS

Daily Breach Intelligence Digest

Get critical and high-severity threats delivered to your inbox every morning. Unsubscribe anytime.

RSS Feed One email per day · No spam · Unsubscribe anytime

DON'T BE A LARRY. TRY LIVETHREAT FREE.

Assess your first vendors free — no credit card, no contract, no gym membership required.

Try 5 Vendors for Free →