$ cipherwatch --feed live --domains all β–ˆ

Decoding Threats.
Watching the Wire.

Daily security intelligence curated from the world's leading sources, mapped across 8 core security disciplines β€” from threat intelligence to application security.

8

Security Domains

Daily

Updates

CVEs

Tracked Live

Latest Intelligence

Recent Articles

🌐Network

APT28 Operation Masquerade: GRU Hijacked 18,000 Routers to Steal Microsoft 365 OAuth Tokens

Russia's GRU Unit 26165 operated an 18,000-router DNS hijacking network targeting Microsoft 365 OAuth tokens across 120 countries. The US DOJ's Operation Masquerade dismantled US-based infrastructure on April 7 2026, but the global campaign continues. Organisations should audit DNS resolver settings, revoke OAuth sessions, and enforce Conditional Access for remote users.

#apt28 +5
πŸ’»AppSec

DPRK's Sapphire Sleet Backdoors Axios npm Package: 100 Million Weekly Downloads at Risk

North Korea's Sapphire Sleet compromised an axios npm maintainer account on March 31, publishing backdoored versions 1.14.1 and 0.30.4 that delivered a cross-platform RAT during a three-hour exposure window. Axios has approximately 100 million weekly downloads. CISA issued Advisory AA26-110A on April 20 β€” organisations that ran npm installs during the window should treat their CI/CD pipeline as compromised and rotate all secrets immediately.

#supply-chain +6
πŸ’»AppSec

CanisterSprawl: Self-Propagating npm Worm Steals Developer Credentials and Re-Infects Package Ecosystems

Researchers discovered CanisterSprawl, a self-propagating npm supply chain worm attributed to TeamPCP that compromised at least 16 packages including pgserve and @automagik/genie. A postinstall hook harvests npm tokens, cloud credentials, SSH keys, and AI tool configs, exfiltrating to a blockchain canister before using stolen tokens to inject the worm into every other package owned by the compromised developer. Organisations should audit postinstall scripts and rotate all credentials from affected development environments.

#supply-chain +6
πŸ›οΈArchitecture

CVE-2026-6074: Unauthenticated Path Traversal in Intrado 911 Emergency Gateway Threatens PSAP Call Routing

CISA ICS advisory ICSA-26-113-06 discloses CVE-2026-6074, a CVSS 9.1 path traversal flaw in Intrado 911 Emergency Gateway versions 5.x–7.x that allows unauthenticated network access to read, write, and delete arbitrary files on the management interface. Exploitation could modify 911 call routing rules or disable emergency call processing. Intrado patched on March 2 2026 and is directly contacting affected PSAP operators.

#ics +6
πŸ—„οΈAssets

France Titres (ANTS) Breach Exposes 11.7 Million Citizens' Identity Records

France's national secure-ID document agency confirmed a breach affecting 11.7 million citizens β€” roughly one in five residents β€” after threat actor 'breach3d' claimed to have exfiltrated records including names, dates of birth, addresses, email addresses, and phone numbers. CNIL, ANSSI, and the Paris Public Prosecutor have been notified. Organisations operating in France face elevated customer account fraud and social engineering risk from the compromised data.

#data-breach +5
βš–οΈRisk Mgmt

Germany BKA Identifies REvil and GandCrab Leader 'UNKN' as Russian National Daniil Shchukin

Germany's federal criminal police (BKA) publicly attributed the REvil and GandCrab ransomware-as-a-service platforms to 31-year-old Russian national Daniil Shchukin, holding him responsible for 130+ attacks in Germany causing over €35 million in economic damage. Shchukin operates from Krasnodar and remains beyond extradition reach, but the attribution breaks the historical anonymity of top-tier RaaS operators and may precede US OFAC sanctions.

#ransomware +6

Opinion & Analysis

Commentary

Opinion

Lockfiles Don't Protect You When the Maintainer Is the Threat

Three npm supply chain attacks in a single week β€” Axios, @bitwarden/cli, and CanisterSprawl β€” have been met with the same industry response: update your lockfile. This is wrong. When the original maintainer account is compromised, a new legitimate-signed version is published, and lockfiles pin to whatever is current, the entire model breaks down. The industry is treating a trust infrastructure failure as a dependency hygiene problem.

CipherWatch Editorial

Security Intelligence Platform

Opinion

The 13-Hour Problem: Your AI Inference Infrastructure Is Already a Tier-One Target

LMDeploy was exploited 13 hours after its RCE vulnerability was disclosed. Langflow took 20 hours. Marimo lasted days. The pattern is not bad luck β€” it is the predictable consequence of treating AI inference infrastructure as development tooling while exposing it like a production web server. The window for getting ahead of this has closed.

CipherWatch Editorial

Security Intelligence Platform

For CISOs, CIOs & Board Members

CIO Briefings

Security events translated into business language β€” financial exposure, regulatory obligations, and board-ready summaries.

High Impact

Russia's GRU Hijacked 18,000 Home Routers to Harvest Microsoft 365 Login Tokens

Russia's military intelligence service operated an 18,000-router network to silently intercept Microsoft 365 authentication tokens from businesses and government agencies across 120 countries. US authorities dismantled US-based infrastructure on April 7 2026, but the campaign continues globally. Organisations with remote workers using home or small-office internet connections should assume Microsoft 365 accounts may have been silently monitored and take immediate steps to invalidate authentication tokens and harden access controls.

Read briefing β†’
High Impact

North Korea Poisoned a Core Software Building Block Used by Virtually Every Organisation

North Korean state hackers took control of a publish account for axios β€” a software component used in an estimated 100 million weekly developer builds β€” and inserted surveillance software for three hours on March 31 2026. Any organisation whose automated software build systems ran during that window may have had credentials and secrets silently stolen. CISA issued a formal advisory on April 20. Organisations should audit build logs and rotate all secrets from potentially affected pipelines immediately.

technology finance DORA
Critical Impact

FIRESTARTER Backdoor Confirmed on US Federal Cisco Firewalls β€” Patching Alone Does Not Remove the Implant

A joint CISA and NCSC advisory confirms that sophisticated attackers have implanted a backdoor on Cisco Firepower and ASA firewalls that survives firmware updates and reimaging. At least one US federal agency is a confirmed victim. Organisations must run vendor-provided integrity checks β€” not just apply patches β€” to confirm their devices are clean.

government critical-infrastructure NIS2
View all CIO Briefings β†’

Stay Vigilant

Intelligence is your first line of defence.

CipherWatch compiles and synthesises security news daily from Krebs on Security, The Hacker News, BleepingComputer, CISA advisories, and more β€” so you stay ahead of the threat curve.

Learn how it works β†’