{"id":21738,"date":"2026-04-27T16:11:11","date_gmt":"2026-04-27T14:11:11","guid":{"rendered":"https:\/\/kordon.app\/?p=21738"},"modified":"2026-04-27T16:11:12","modified_gmt":"2026-04-27T14:11:12","slug":"latest-interesting-cybersecurity-news-2026-26-04","status":"publish","type":"post","link":"https:\/\/kordon.app\/et\/latest-interesting-cybersecurity-news-2026-26-04\/","title":{"rendered":"Latest Interesting Cybersecurity News &#8211; 2026-26-04"},"content":{"rendered":"\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>I go through about 25 cybersecurity news portals and blogs every week and pull out the most interesting stories. <\/strong>Then I turn them into this short, digestible summary, so you can stay up to date without trying to follow 25 different sources yourself. \ud83d\ude31<\/p>\n\n\n\n<p>My aim is to create a summary that gives you the gist without needing to open up the source article. But if you do want to dig deeper, all the sources covering the event are linked below each story.<\/p>\n\n\n\n<p><strong>If you enjoy these, come back next Monday<\/strong><\/p>\n\n\n\n<p><strong>scroll to the bottom to subscribe to the e-mail newsletter.<\/strong><\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">1. Microsoft open-sources Agent Governance Toolkit to enforce deterministic runtime policies for AI agent actions<\/h2>\n\n\n\n<pre class=\"wp-block-verse\"><b>Microsoft released the Agent Governance Toolkit (public preview) to sit between AI agent frameworks and the tools\/resources agents try to use, enforcing deterministic allow\/deny decisions and generating audit evidence before execution.<\/b> It targets \u201cruntime governance\u201d controls (policy enforcement, identity, sandboxing, and operational guardrails) and claims full coverage of the OWASP Agentic Top 10 via 9,500+ tests, positioning it as an application-layer alternative to prompt-only safety controls.<\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>The toolkit explicitly governs agent actions (tool calls, resource access, inter-agent messages) rather than LLM inputs\/outputs<\/b>, and describes its checks as deterministic (&#8220;not probabilistic&#8221;).<\/li>\n\n\n<li><b>Integrations are positioned as framework-agnostic<\/b>, listing support paths (middleware\/adapters\/plugins) for stacks such as Semantic Kernel, AutoGen, LangChain\/LangGraph, CrewAI, OpenAI Agents SDK, and Google ADK.<\/li>\n\n<\/ul>\n\n\n\n<p><strong>Read more at <\/strong><a href=\"https:\/\/github.com\/microsoft\/agent-governance-toolkit\">GitHub<\/a><\/p>\n\n\n\n\n\n<h2 class=\"wp-block-heading\">2. Microsoft to enable Entra passkey sign-ins from unmanaged Windows PCs, rolling out in late April<\/h2>\n\n\n\n<pre class=\"wp-block-verse\">Microsoft will roll out Entra passkeys on Windows starting in late April, with general availability expected by mid-June 2026.<b>&nbsp;<\/b><div><b><br><\/b><\/div><div><b>The feature enables phishing-resistant, passwordless authentication to Entra-protected resources \u2014 and crucially, it now works on&nbsp;any&nbsp;Windows device, not just company-managed ones.<\/b>&nbsp;<div><br><\/div><div>Previously, users on personal or shared Windows devices that weren't enrolled in company management had to fall back to passwords. Now they can authenticate using Windows Hello (face, fingerprint, or PIN) from those devices too, with each device storing its own passkey locally.<br><\/div><\/div><\/pre>\n\n\n\n<p><strong>Next Steps<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>If you want to support this, <b>enable \u201cMicrosoft Entra ID with passkeys\u201d in Entra Authentication Methods<\/b> and verify your Conditional Access policies permit the intended device scenarios (corporate-managed, personal, shared).<\/li>\n\n<\/ul>\n\n\n\n<p><strong>Read more at <\/strong><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-to-roll-out-entra-passkeys-on-windows-in-late-april\/\">BleepingComputer<\/a><\/p>\n\n\n\n\n\n<h2 class=\"wp-block-heading\">3. Helpdesk impersonation over Microsoft Teams used to trick users into installing SNOW malware and remote access tools<\/h2>\n\n\n\n<pre class=\"wp-block-verse\">Microsoft Teams allows anyone to register a tenant with any display name and cold-message your employees \u2014 arriving inside Teams looking like internal IT. UNC6692 exploits this by impersonating helpdesk staff, often after deliberately flooding victims with spam to create panic. Employees who comply are walked into installing malware that enables credential theft, browser hijacking, and persistent remote access.<br><\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>The attack installed SNOWBELT, a malicious Chromium-based browser extension<\/b> by launching Microsoft Edge in headless mode and loading the extension, then used it to pull additional SNOW components.<\/li>\n\n\n<li><b>The SNOW toolkit is modular<\/b>: SNOWBELT (JS backdoor) relays tasks to SNOWBASIN (persistent command execution, file transfer, screenshots) and SNOWGLAZE (Python tunneler creating an authenticated WebSocket tunnel to C2).<\/li>\n\n<\/ul>\n\n\n\n<p><strong>Next Steps<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>Restrict or disable Teams inbound chats\/meetings from external tenants<\/b><\/li>\n\n<\/ul>\n\n\n\n<p><strong>Read more at <\/strong><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/threat-actor-uses-microsoft-teams-to-deploy-new-snow-malware\/\">BleepingComputer<\/a>, <a href=\"https:\/\/thehackernews.com\/2026\/04\/unc6692-impersonates-it-helpdesk-via.html\">The Hacker News<\/a>, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-teams-increasingly-abused-in-helpdesk-impersonation-attacks\/\">BleepingComputer<\/a>, <a href=\"https:\/\/www.csoonline.com\/article\/4160858\/attackers-abuse-microsoft-teams-to-impersonate-the-it-helpdesk-in-a-new-enterprise-intrusion-playbook.html\">CSO Online<\/a><\/p>\n\n\n\n\n\n<h2 class=\"wp-block-heading\">4. GitHub issue lures can trick developers into authorizing malicious OAuth apps with repo and workflow access<\/h2>\n\n\n\n<pre class=\"wp-block-verse\">A phishing technique <b>abuses GitHub's own notification infrastructure to deliver convincing security alerts that drive targets to authorize a malicious GitHub OAuth App <\/b>requesting broad scopes.<div><br><\/div><div><b>Mentioning any GitHub user in an issue on any public repository (including one the attacker creates themselves) automatically triggers an official email notification to their primary address, sent from&nbsp;noreply@github.com<\/b>.&nbsp;<\/div><div><br><\/div><div>The email contains the issue body, where action links disguised behind a URL shortener lead directly to a malicious app's GitHub OAuth authorization prompt.&nbsp;<\/div><div><b><br><\/b><\/div><div><b>If the victim clicks \"Authorize,\" <\/b>the attacker's app obtains an access token granting data access and code\/workflow modification rights across the victim's GitHub account.<br><\/div><\/pre>\n\n\n\n<p><strong>Next Steps<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Be suspicious of Github notification e-mails.<\/li>\n\n<\/ul>\n\n\n\n<p><strong>Read more at <\/strong><a href=\"https:\/\/blog.atsika.ninja\/posts\/the-phishy-github-issue-case\/\">atsika.ninja<\/a><\/p>\n\n\n\n\n\n<h2 class=\"wp-block-heading\">5. Bitwarden CLI npm package version @bitwarden\/cli 2026.4.0 found compromised via GitHub Actions supply-chain vector<\/h2>\n\n\n\n<pre class=\"wp-block-verse\">Socket reported that <b>the Bitwarden (\"the best password manager for businesses\") CLI npm package was compromised<\/b>, with malicious code shipped inside the published package and linked to the wider Checkmarx GitHub Actions supply-chain campaign.&nbsp;<div><br><\/div><div>The payload is described as stealing CI\/CD and developer credentials (including GitHub and npm tokens and cloud credentials) and using attacker-controlled infrastructure for exfiltration.<\/div><\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>Affected npm artifact identified so far:<\/b> @bitwarden\/cli2026.4.0, with the malicious payload located in a package file named bw1.js.<\/li>\n\n\n<li><b>Exfiltration infrastructure overlaps the Checkmarx campaign<\/b>, including calls to audit.checkmarx[.]cx\/v1\/telemetry and an associated IP 94[.]154[.]172[.]43.<\/li>\n\n\n<li><b>Credential theft targets multiple secret sources<\/b> (per the analysis), including GitHub Actions tokens (via runner memory scraping and environment variables), npm tokens (.npmrc), SSH keys, and cloud credentials for AWS\/Azure\/GCP.<\/li>\n\n<\/ul>\n\n\n\n<p><strong>Next Steps<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>Remove\/block @bitwarden\/cli2026.4.0<\/b> in developer and CI environments and identify any systems that installed it.<\/li>\n\n\n<li><b>Rotate potentially exposed secrets<\/b> for affected environments (GitHub tokens, npm tokens, CI\/CD secrets, cloud credentials, SSH keys) and review CI logs tied to the compromised workflow execution.<\/li>\n\n<\/ul>\n\n\n\n<p><strong>Read more at <\/strong><a href=\"https:\/\/socket.dev\/blog\/bitwarden-cli-compromised?utm_medium=feed\">Socket<\/a><\/p>\n\n\n\n\n\n<h2 class=\"wp-block-heading\">6. Apple fixes iOS\/iPadOS bug that retained \u201cdeleted\u201d notifications, enabling recovery of message content from notification history<\/h2>\n\n\n\n<pre class=\"wp-block-verse\">Apple released updates to fix CVE-2026-28950, a Notification Services issue where <b>notifications marked for deletion could be unexpectedly retained on the device<\/b>. The flaw matters because retained notification content (including message previews) can be forensically extracted from a device\u2019s notification history database even after the originating app is removed.<\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The update follows reporting that <b>the FBI extracted copies of incoming Signal messages from an iPhone via the push notification database<\/b>, even after the app was deleted.<\/li>\n\n\n<li>Signal stated that after installing the patch, <b>previously preserved notifications will be deleted and future notifications won\u2019t be preserved for deleted applications<\/b>.<\/li>\n\n<\/ul>\n\n\n\n<p><strong>Next Steps<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Deploy <b>iOS 26.4.2 \/ iPadOS 26.4.2 or iOS 18.7.8 \/ iPadOS 18.7.8<\/b> across impacted fleets (per Apple\u2019s device lists).<\/li>\n\n\n<li>Set Signal (and other messaging app&#8217;s) notification previews to <b>\u201cName only\u201d or \u201cNo name or message\u201d<\/b> (Signal: Profile \u2192 Notifications \u2192 Show).<\/li>\n\n<\/ul>\n\n\n\n<p><strong>Read more at <\/strong><a href=\"https:\/\/thehackernews.com\/2026\/04\/apple-patches-ios-flaw-that-stored.html\">The Hacker News<\/a><\/p>\n\n\n\n\n\n<h2 class=\"wp-block-heading\">7. Deepfake-enabled mobile KYC fraud used stolen IDs to open 46 ABN AMRO bank accounts<\/h2>\n\n\n\n<pre class=\"wp-block-verse\">A fraudster reportedly used stolen identity documents plus <b>deepfake-generated selfies to pass ABN AMRO\u2019s (3rd largest bank in the Netherlands) mobile onboarding facial checks and open 46 accounts<\/b>.&nbsp;<div><br><\/div><div>The case illustrates how selfie-to-ID face matching can be defeated when the system verifies likeness but not whether a real, live person is present at capture time.<\/div><\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The stolen IDs were gathered via <b>a fake rental listing on Marktplaats and additional harvesting from social media<\/b>.<\/li>\n\n\n<li>Police and prosecutors cited seizures including <b>multiple debit cards and PINs tied to ABN AMRO accounts, dozens of fake IDs, and chat logs showing the suspect asked ChatGPT how to bypass bank security<\/b>.<\/li>\n\n<\/ul>\n\n\n\n<p><strong>Read more at <\/strong><a href=\"https:\/\/www.iproov.com\/blog\/deepfake-bank-account-kyc-account-fraud-abn-amro\">iProov<\/a><\/p>\n\n\n\n\n\n<h2 class=\"wp-block-heading\">8. Florida opens criminal investigation into OpenAI, subpoenas sought over ChatGPT chats tied to FSU shooting<\/h2>\n\n\n\n<pre class=\"wp-block-verse\">Florida Attorney General James Uthmeier said the state has opened a criminal investigation and issued subpoenas seeking information from OpenAI over whether <b>ChatGPT bears any criminal responsibility for communications with the Florida State University shooter<\/b>. The probe centers on claims the shooter asked the chatbot questions that could support planning a shooting, raising a novel test of how prosecutors may try to apply criminal liability theories to AI product design and operation.<\/pre>\n\n\n\n<p><strong>Read more at <\/strong><a href=\"https:\/\/siliconangle.com\/2026\/04\/21\/florida-attorney-general-issues-subpoenas-chatgpt-probe-fsu-shooting\/\">SiliconANGLE<\/a><\/p>\n\n\n\n\n\n<h2 class=\"wp-block-heading\">9. FIRESTARTER backdoor persists on Cisco ASA\/Firepower firewalls after patching, requiring power-cycle and often reimage<\/h2>\n\n\n\n<pre class=\"wp-block-verse\">CISA and the UK NCSC disclosed FIRESTARTER, a Cisco ASA\/Firepower backdoor that <b>can survive firmware updates and normal reboots after the original CVEs were patched<\/b>, enabling threat actors to retain or regain access without re-exploitation. The malware achieves persistence by embedding itself into the device\u2019s boot process and then hooking core firewall\/VPN processing to execute attacker-provided code when triggered by specially crafted traffic.<\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>CISA found FIRESTARTER on a US federal civilian agency Cisco Firepower device<\/b> after suspicious connections were detected via continuous monitoring; the discovery drove an updated CISA emergency directive for federal agencies.<\/li>\n\n\n<li><b>Only a hard power cycle (physically removing power) clears the in-memory persistence mechanism<\/b>; standard reboot\/reload commands do not remove it, per CISA and Cisco.<\/li>\n\n<\/ul>\n\n\n\n<p><strong>Read more at <\/strong><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/firestarter-malware-survives-cisco-firewall-updates-security-patches\/\">BleepingComputer<\/a>, <a href=\"https:\/\/securityaffairs.com\/191241\/hacking\/cisa-reports-persistent-firestarter-backdoor-on-cisco-asa-device-in-federal-network.html\">Security Affairs<\/a>, <a href=\"https:\/\/thehackernews.com\/2026\/04\/firestarter-backdoor-hit-federal-cisco.html\">The Hacker News<\/a>, <a href=\"https:\/\/www.securityweek.com\/us-federal-agencys-cisco-firewall-infected-with-firestarter-backdoor\/\">SecurityWeek<\/a>, <a href=\"https:\/\/cyberscoop.com\/cisco-firestarter-malware-cisa-warning\/\">CyberScoop<\/a><\/p>\n\n\n\n\n\n<h2 class=\"wp-block-heading\">10. 73 Open VSX \u201csleeper\u201d lookalike extensions impersonate popular tools, then activate via updates to pull VSIX malware<\/h2>\n\n\n\n<pre class=\"wp-block-verse\">Researchers reported <b>73 new Open VSX Marketplace impersonation extensions linked to the GlassWorm campaign<\/b>, published as lookalike clones that initially appear benign. <b>At least six have since \u201cactivated\u201d via normal extension updates to install malware<\/b>, using the extension as a thin loader that fetches or runs payloads from outside the visible source code.<\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>Impersonation relies on cloned listings (icons, names, descriptions, README content)<\/b> so a quick browse can confuse them with legitimate extensions (example cited: a Turkish language pack clone mimicking the real MS-CEINTL publisher).<\/li>\n\n<\/ul>\n\n\n\n<p><strong>Next Steps<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Establish a strong process for IDE extension vetting and allowlisting.<\/li>\n\n\n<li><b>Hunt for and remove the confirmed malicious Open VSX extensions<\/b> listed in the report (including: outsidestormcommand.monochromator-theme; keyacrosslaud.auto-loop-for-antigravity; krundoven.ironplc-fast-hub; boulderzitunnel.vscode-buddies; cubedivervolt.html-code-validate; winnerdomain17.version-lens-tool).<\/li>\n\n<\/ul>\n\n\n\n<p><strong>Read more at <\/strong><a href=\"https:\/\/socket.dev\/blog\/73-open-vsx-sleeper-extensions-glassworm?utm_medium=feed\">Socket<\/a>, <a href=\"https:\/\/cybersecuritynews.com\/73-open-vsx-sleeper-extensions-linked-to-glassworm-malware\/\">Cybersecurity News<\/a><\/p>\n\n\n\n\n\n<h2 class=\"wp-block-heading\">Subscribe<\/h2>\n\n\n\n<p>Subscribe to receive this weekly cybersecurity news summary to your inbox every Monday.<\/p>\n\n\n                <div class=\"ml-embedded\" data-form=\"pKq7EM\"><\/div>\n            ","protected":false},"excerpt":{"rendered":"<p>Latest interesting cybersecurity news from April 2026<\/p>","protected":false},"author":1,"featured_media":21740,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-21738","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/posts\/21738","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/comments?post=21738"}],"version-history":[{"count":1,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/posts\/21738\/revisions"}],"predecessor-version":[{"id":21741,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/posts\/21738\/revisions\/21741"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/media\/21740"}],"wp:attachment":[{"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/media?parent=21738"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/categories?post=21738"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/tags?post=21738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}