[{"data":1,"prerenderedAt":113},["ShallowReactive",2],{"publication-daily-threat-publications-2026-04-10":3},{"pub_id":4,"headline":5,"summary":6,"pub_date":7,"total_articles":8,"articles":9},"pub-2026-04-10","Supply Chain Attacks Rock Software Ecosystem; Ransomware Cripples Dutch Healthcare and US Hospitals","A turbulent day in cybersecurity saw multiple, high-impact supply chain attacks compromising trusted software vendors like CPUID, Anodot, and the open-source library Axios, distributing malware to unsuspecting users. Simultaneously, ransomware attacks caused severe disruptions to critical infrastructure, with a major Dutch healthcare IT provider and multiple US hospitals and a county government falling victim, forcing service cancellations and a reversion to manual operations. Federal agencies also issued an urgent warning about ongoing Iranian state-sponsored attacks targeting US water and energy systems, highlighting the escalating threat to operational technology.","2026-04-10",5,[10,33,54,71,87],{"id":11,"slug":12,"headline":13,"title":14,"severity":15,"excerpt":16,"tags":17,"categories":24,"createdAt":27,"updatedAt":28,"readingTime":29,"isUpdate":30,"updateSummary":31,"updateContent":32},"984670b1-dc0f-41e8-80a3-0c32484952cb","79-percent-it-leaders-view-ai-powered-attacks-as-significant-threat","AI-Powered Attacks Now a Top Concern for 79% of IT Leaders, Armis Report Finds","Armis Report: Nearly 8 in 10 IT Leaders View AI-Powered Attacks as a Major Threat","informational","According to the fourth annual 'State of Cyberwarfare Report' by Armis, 79% of global IT decision-makers now consider artificial intelligence a significant security threat. The report, which surveyed 1,900 IT leaders, highlights a new phase of cyber conflict where AI is being weaponized by attackers to automate reconnaissance, vulnerability discovery, and lateral movement. Experts warn that AI compresses the 'critical risk window' between vulnerability discovery and exploitation, outpacing the response capabilities of many security teams. In response, 49% of security leaders are making AI and automation their top investment priority for 2026 to keep pace with these accelerated threats.",[18,19,20,21,22,23],"AI","Artificial Intelligence","Cyberwarfare","Threat Landscape","Armis","Security Report",[25,26],"Threat Intelligence","Policy and Compliance","2026-03-18T15:00:00.000Z","2026-04-10T12:00:00.000Z",3,true,"Rapid7 report: median time-to-exploit for vulnerabilities is now 5 days to CISA KEV, down from 8.5, due to AI and cybercrime industrialization, making n-day flaws a critical threat.","A new Rapid7 report provides concrete data on the accelerating threat landscape, showing the median time from vulnerability disclosure to CISA KEV inclusion has plummeted from 8.5 to 5.0 days. The mean time-to-exploit also halved to 28.5 days. This acceleration is attributed to the industrialization of cybercrime and AI's role in rapidly generating exploits via binary diffing. This makes known, unpatched 'n-day' vulnerabilities a more significant and immediate threat than zero-days, putting immense pressure on organizations to automate and accelerate patching cycles to avoid compromise.",{"id":34,"slug":35,"headline":36,"title":37,"severity":38,"excerpt":39,"tags":40,"categories":47,"createdAt":51,"updatedAt":51,"readingTime":52,"isUpdate":53},"4b6240b6-06c4-40a8-8317-047b2828f058","cpuid-supply-chain-attack-distributes-stx-rat-malware","CPUID Website Hijacked in Supply Chain Attack to Distribute STX RAT Infostealer","CPUID Supply Chain Attack: Trojanized CPU-Z and HWMonitor Installers Deploy STX RAT Malware","high","Between April 9 and April 10, 2026, the official website of popular utility software provider CPUID was compromised in a supply chain attack. For up to 19 hours, attackers hijacked a website API to redirect download links for the widely-used CPU-Z and HWMonitor tools. Unsuspecting users were served trojanized installers that used a DLL side-loading technique to deploy the STX RAT, a potent information-stealing malware. The attack, which reused infrastructure from a previous campaign, successfully infected over 150 victims across multiple countries, primarily targeting individuals but also impacting organizations in retail, manufacturing, and telecommunications.",[41,42,43,44,45,46],"supply chain attack","watering hole","STX RAT","DLL side-loading","infostealer","CPUID",[48,49,50],"Supply Chain Attack","Malware","Cyberattack","2026-04-10T15:00:00.000Z",6,false,{"id":55,"slug":56,"headline":57,"title":58,"severity":38,"excerpt":59,"tags":60,"categories":67,"createdAt":51,"updatedAt":51,"readingTime":70,"isUpdate":53},"5eb8acce-35a4-493e-a698-6000c361400f","winona-county-minnesota-hit-by-second-cyberattack-in-2026","Minnesota's Winona County Suffers Second Crippling Ransomware Attack This Year","Winona County, Minnesota Declares State of Emergency After Second Ransomware Attack in 2026","Winona County, Minnesota, is grappling with its second major cyberattack of 2026 after detecting a ransomware incident on April 7. The attack has severely disrupted government functions, taking many critical systems and digital services offline. Due to the incident's complexity, Minnesota's governor deployed the National Guard's cyber protection team to assist with response and recovery. While 911 services remain operational, other functions like the DMV are unavailable. This is the second time the county has been targeted this year, with a preliminary investigation suggesting a different threat actor is responsible for the latest attack.",[61,62,63,64,65,66],"ransomware","local government","minnesota","winona county","national guard","incident response",[68,50,69],"Ransomware","Incident Response",4,{"id":72,"slug":73,"headline":74,"title":75,"severity":38,"excerpt":76,"tags":77,"categories":84,"createdAt":51,"updatedAt":51,"readingTime":8,"isUpdate":53},"e59f1c93-f8c7-489e-b1f8-f7a93e863c59","anodot-supply-chain-breach-hits-snowflake-customers","Anodot Breach Leads to Supply Chain Attack on Snowflake Customers; ShinyHunters Claims Responsibility","SaaS Vendor Anodot Breached; ShinyHunters Gang Uses Stolen Tokens to Attack Snowflake Customers","A security breach at Israeli AI analytics firm Anodot has resulted in a significant downstream supply chain attack targeting customers of the cloud data platform Snowflake. The 'ShinyHunters' extortion gang claimed responsibility on April 7, 2026, stating they leveraged stolen authentication tokens from Anodot's systems to gain unauthorized access to their customers' Snowflake instances. This allowed the attackers to bypass traditional defenses and steal data from multiple companies. High-profile victims, including Rockstar Games, have been named on the gang's leak site, with ransom demands issued to prevent the data from being published.",[41,78,79,80,81,82,83],"shinyhunters","anodot","snowflake","data breach","cloud security","rockstar games",[48,85,86],"Data Breach","Cloud Security",{"id":88,"slug":89,"headline":90,"title":91,"severity":92,"excerpt":93,"tags":94,"categories":102,"createdAt":51,"updatedAt":51,"readingTime":70,"cves":105,"isUpdate":53},"44e41a36-71a0-4a6f-965f-ac21544a4a13","google-chrome-update-patches-60-vulnerabilities-including-critical-bugs","Google Issues Urgent Chrome Update to Patch 60 Flaws, Including Two Critical Bugs","Google Chrome 147 Patches 60 Vulnerabilities, Including Two Critical RCE Flaws","critical","Google has released an urgent security update for its Chrome browser, version 147, patching a total of 60 vulnerabilities. The update, announced around April 9, 2026, addresses two critical flaws, CVE-2026-5858 (a heap buffer overflow) and CVE-2026-5859 (an integer overflow), both in Chrome's WebML component. These vulnerabilities could be exploited for remote code execution, and Google awarded researchers a combined $86,000 in bug bounties for their discovery. The update also fixes 14 high-severity flaws affecting components like WebRTC and the V8 JavaScript engine. Users are strongly advised to update their browsers immediately.",[95,96,97,98,99,100,101],"google chrome","vulnerability","patch management","rce","cve-2026-5858","cve-2026-5859","webml",[103,104],"Patch Management","Vulnerability",[106,107,108,109,110,111,112],"CVE-2026-5858","CVE-2026-5859","CVE-2026-5860","CVE-2026-5861","CVE-2026-5862","CVE-2026-5863","CVE-2026-5874",1776260665675]