This edition covers a tumultuous period in cybersecurity for April 5, 2026, dominated by sophisticated supply chain attacks and the active exploitation of critical zero-day vulnerabilities. The European Commission and AI firms like Meta suffered major data breaches originating from compromised open-source tools including Trivy and LiteLLM, with threat actor TeamPCP implicated in both. Concurrently, Fortinet and Google scrambled to patch actively exploited zero-days in FortiClient EMS (CVE-2026-35616) and the Chrome browser (CVE-2026-5281), both added to CISA's KEV catalog. Critical infrastructure also came under fire, with CISA issuing an emergency directive to decommission medical IoT gateways due to the 'Vitals Vapor' exploit, and Australian water facilities thwarting an attack on their control systems.
Help others stay informed about cybersecurity threats
Curated and deduplicated every day from dozens of trusted sources — giving you one clean, consolidated view of what matters in cybersecurity.
Related stories are merged into a single evolving article rather than repeated as separate entries — cutting through noise so you only read what's new.
Every entry links to its full enriched article — complete with MITRE ATT&CK mappings, extracted IOCs, and actionable detection and mitigation guidance.