LiveThreat Breach Watch

BREACH WATCH

Live threat intelligence from multiple sources. Updated every 6 hours.

Try 5 Vendors for Free →📡 RSS Feed
39
Last 24h
253
Last 7 Days
19
Critical (7d)
🔍
Showing 21 of 3351 results
ADVISORYLIVETHREAT BRIEF📰
LIVETHREAT BRIEFCoast Guard Mandates Cybersecurity Standards for U.S. Vessels and Ports, Driving Maritime OT Market Surge

The U.S. Coast Guard has issued a rule requiring cybersecurity officers, assessments, and plans for all U.S.-flagged commercial vessels and port facilities by July 2027. The mandate will reshape vendor risk assessments and inject over $1 B in compliance spend, making it a critical TPRM focus for maritime operators and OT service providers.

🏭 Transportation & Logistics
Medium · Apr 21, 2026 · DataBreachToday
Read Full Intelligence Brief →
BREACHLIVETHREAT BRIEF🏥
LIVETHREAT BRIEFTempus AI Faces Class‑Action Lawsuits Over Unconsented Use and Sale of 45 Million Genetic Records

Tempus AI is sued for training AI on and selling genetic data acquired from Ambry Genetics without patient consent, exposing pharma partners and downstream users to regulatory risk and potential re‑identification of supposedly de‑identified DNA.

🏭 Healthcare & Life Sciences⚡ Regulatory Disclosure🔒 Protected Health Info
High · Apr 21, 2026 · DataBreachToday
Read Full Intelligence Brief →
ADVISORYLIVETHREAT BRIEF🤖
LIVETHREAT BRIEFKPMG Survey Finds Only 8% of Enterprises Achieve Tangible AI ROI, Emphasizes Governance and Cybersecurity Investments

A KPMG survey of 2,110 C‑suite leaders shows that while 95% have AI strategies, only 8% report measurable returns. The report highlights the need for robust AI governance, data protection, and operational integration—critical considerations for third‑party risk managers evaluating AI‑enabled vendors.

Informational · Apr 21, 2026 · DataBreachToday
Read Full Intelligence Brief →
ADVISORYLIVETHREAT BRIEF🏥
LIVETHREAT BRIEFSecureRouter Cuts Encrypted AI Inference Latency by Up to 2×, Enabling Faster Private ML for Regulated Industries

University of Central Florida researchers introduced SecureRouter, an encrypted routing layer that dynamically selects AI models during MPC‑based inference. The approach halves latency compared with fixed‑model private inference, making secure AI more practical for healthcare, finance, and other data‑sensitive sectors.

🏭 Healthcare & Life Sciences
Informational · Apr 21, 2026 · Help Net Security
Read Full Intelligence Brief →
ADVISORYLIVETHREAT BRIEF☁️
LIVETHREAT BRIEFHelp Net Security Publishes Updated List of Cybersecurity Job Openings Across Multiple Sectors (April 21 2026)

Help Net Security released a comprehensive snapshot of current cybersecurity vacancies, covering roles from DevSecOps engineers to AI security testers. The list highlights emerging skill demands that third‑party risk managers should monitor when evaluating vendor capabilities.

🏭 Technology & SaaS
Informational · Apr 21, 2026 · Help Net Security
Read Full Intelligence Brief →
ADVISORYLIVETHREAT BRIEF🤖
LIVETHREAT BRIEFSANS Internet Storm Center Publishes Daily Stormcast – Emerging Threat Trends for April 21 2026

The SANS ISC released its April 21 2026 Stormcast podcast, outlining the latest malware, phishing, and vulnerability activity observed worldwide. TPRM teams should ingest these indicators to keep vendor risk assessments current.

🌐 sans.edu
Informational · Apr 21, 2026 · SANS Internet Storm Center
Read Full Intelligence Brief →
BREACHLIVETHREAT BRIEF📰
LIVETHREAT BRIEFKelpDAO Loses $290 Million in Cross‑Chain Exploit Attributed to North Korean Lazarus Group

State‑sponsored Lazarus hackers hijacked LayerZero’s verification layer, stealing $290 M of rsETH from KelpDAO and forcing major DeFi lenders to freeze collateral. The breach highlights supply‑chain risk in cross‑chain infrastructure for crypto‑finance platforms.

🏭 Technology & SaaS⚡ Data Exfiltration🎯 Third-Party Dependency
Critical · Apr 20, 2026 · BleepingComputer
Read Full Intelligence Brief →
THREAT INTELLIVETHREAT BRIEF🤖
LIVETHREAT BRIEFCrypto‑Stealing Wallet Apps Infiltrate Apple App Store in China, Targeting Users with Phishing and Provisioning Profile Abuse

A set of 26 counterfeit cryptocurrency wallet apps slipped into Apple’s App Store for China, using typosquatting and fake branding to lure users. Once installed, the apps redirected victims to phishing sites and abused iOS provisioning profiles to exfiltrate seed phrases, enabling full wallet takeover. The campaign highlights a supply‑chain risk for any organization that permits mobile wallet usage.

🏭 Financial Services & FinTech⚡ Credential Compromise🎯 Malware
High · Apr 20, 2026 · BleepingComputer
Read Full Intelligence Brief →
BREACHLIVETHREAT BRIEF🤖
LIVETHREAT BRIEFVercel Breach Exposes Customer Data via Context.ai Integration, Data Offered for $2 M

Vercel disclosed a breach tied to its Context.ai integration that resulted in the theft of customer data now listed for $2 million. The incident highlights supply‑chain risk for organizations relying on cloud‑hosted platforms and third‑party services.

🏭 Technology & SaaS🎯 Third-Party Dependency
High · Apr 20, 2026 · HackRead
Read Full Intelligence Brief →
BREACHLIVETHREAT BRIEF👤
LIVETHREAT BRIEFVercel Employee’s AI Tool Access Exposes OAuth Tokens, Triggering Data Breach

A Vercel employee’s use of an internal AI development assistant inadvertently accessed and leaked OAuth tokens, allowing attackers to retrieve source code and configuration data from Vercel‑hosted projects. The breach underscores the third‑party risk of credential exposure in SaaS platforms.

🏭 Technology & SaaS🎯 Stolen Credentials
High · Apr 20, 2026 · Dark Reading
Read Full Intelligence Brief →
VULNERABILITYLIVETHREAT BRIEF📡
LIVETHREAT BRIEFThousands of Vulnerabilities Discovered in Serial‑to‑IP OT Devices Threaten Industrial Networks

Researchers have uncovered thousands of known and new vulnerabilities in serial‑to‑IP converters that bridge legacy machine protocols to Ethernet. The flaws enable remote code execution, credential theft, and denial‑of‑service, putting manufacturing, energy, and other OT‑heavy sectors at risk. TPRM teams must inventory, patch, or isolate these devices to close a critical supply‑chain gap.

🏭 Manufacturing & Industrial🎯 Vulnerability Exploit
High · Apr 20, 2026 · Dark Reading
Read Full Intelligence Brief →
BREACHLIVETHREAT BRIEF📰
LIVETHREAT BRIEFFrance’s ANTS ID System Breached, Potential Exposure of 18‑19 Million Citizens’ Personal Data

A cyber‑attack on the French ANTS portal on 15 April 2026 may have leaked personal details of up to 19 million individuals, including names, emails, birth dates and addresses. The breach poses significant identity‑theft risk for third‑party services that rely on ANTS‑verified data, making it a high‑priority TPRM concern.

🏭 Government & Public Sector
High · Apr 20, 2026 · Security Affairs
Read Full Intelligence Brief →
ADVISORYLIVETHREAT BRIEF📰
LIVETHREAT BRIEFSurfshark Launches Dausos VPN Protocol Claiming Up to 30% Speed Gains Over WireGuard

Surfshark unveiled Dausos, a proprietary VPN protocol using AEGIS‑256X2 encryption and dedicated per‑user tunnels. Independent testing shows promising security enhancements but performance still trails WireGuard. TPRM teams should assess audit findings and pilot the protocol before enterprise rollout.

🏭 Technology & SaaS
Low · Apr 20, 2026 · ZDNet Security
Read Full Intelligence Brief →
RANSOMWARELIVETHREAT BRIEF💀
LIVETHREAT BRIEFGentlemen Ransomware Leverages SystemBC Botnet to Target Corporate Networks Globally

The Gentlemen ransomware‑as‑a‑service group has incorporated the SystemBC proxy botnet (≈1,570 compromised hosts) into its delivery chain, enabling covert, high‑volume attacks on corporate environments worldwide. This evolution raises supply‑chain risk for vendors hosting or relying on virtual servers.

🏭 Energy & Utilities⚡ Ransomware🎯 Malware
High · Apr 20, 2026 · BleepingComputer
Read Full Intelligence Brief →
BREACHLIVETHREAT BRIEF🔑
LIVETHREAT BRIEFAmtrak CRM Breach Exposes 2.1 Million Passenger Records via Stolen Credentials

Attackers accessed Amtrak’s customer‑relationship‑management system and extracted personal data for over 2.1 million travelers. The breach highlights third‑party SaaS risk for transportation firms and the need for stricter credential controls.

🏭 Transportation & Logistics⚡ Data Exfiltration🎯 Stolen Credentials
High · Apr 20, 2026 · TechRepublic Security
Read Full Intelligence Brief →
VULNERABILITYLIVETHREAT BRIEF🔗
LIVETHREAT BRIEFAI Supply Chain Vulnerability in MCP Exposes Enterprises to Open‑Redirect Attacks

A newly disclosed open‑redirect flaw in the Model Control Plane (MCP) used by many AI SaaS platforms enables attackers to hijack model‑inference traffic, threatening data confidentiality and downstream services. Third‑party risk managers should reassess AI vendor controls and demand remediation to protect the AI supply chain.

🏭 Technology & SaaS🎯 Vulnerability Exploit
High · Apr 20, 2026 · TechRepublic Security
Read Full Intelligence Brief →
VULNERABILITYLIVETHREAT BRIEF☁️
LIVETHREAT BRIEFExploited Microsoft Defender Flaws Leave Windows 10/11 Systems Partially Unprotected

Active exploitation of three Microsoft Defender vulnerabilities on Windows 10/11 has been confirmed. While Microsoft patched the BlueHammer issue, two additional flaws remain unpatched, exposing enterprises and managed service providers to elevated risk.

🎯 Malware
High · Apr 20, 2026 · TechRepublic Security
Read Full Intelligence Brief →
BREACHLIVETHREAT BRIEF📰
LIVETHREAT BRIEFScattered Spider Member Pleads Guilty to $8 M Crypto Theft via SMS Phishing and SIM‑Swap Attacks

Tyler Buchanan, a key operative of the Scattered Spider group, admitted to hacking dozens of companies, stealing roughly $8 million in cryptocurrency, and exfiltrating sensitive corporate data through SMS‑based phishing and SIM‑swap attacks. The case underscores the risk of SMS MFA and the need for stronger credential protection in third‑party relationships.

🏭 Financial Services & FinTech🎯 Phishing
High · Apr 20, 2026 · Security Affairs
Read Full Intelligence Brief →
THREAT INTELLIVETHREAT BRIEF🏦
LIVETHREAT BRIEFOverlay‑Based Trojan Targets 800+ Android Banking Apps to Steal PINs

A sophisticated Android banking‑malware campaign is abusing screen‑overlay and Accessibility permissions to harvest PINs from over 800 mobile applications. The threat poses a high risk to financial‑service vendors and their downstream partners, demanding immediate review of mobile SDKs and device controls.

🏭 Financial Services & FinTech🎯 Malware
High · Apr 20, 2026 · TechRepublic Security
Read Full Intelligence Brief →
VULNERABILITYLIVETHREAT BRIEF🐛
LIVETHREAT BRIEFCritical RCE in SGLang (CVE-2026-5760) Threatens AI Model‑Serving Platforms

A newly disclosed CVE‑2026‑5760 in the open‑source SGLang library allows remote code execution when malicious GGUF model files are processed. The flaw, scored 9.8 CVSS, impacts any organization using SGLang for AI inference, creating a high‑risk supply‑chain exposure for third‑party risk managers.

🏭 Technology & SaaS🎯 Vulnerability Exploit
Critical · Apr 20, 2026 · The Hacker News
Read Full Intelligence Brief →
ADVISORYLIVETHREAT BRIEF🏦
LIVETHREAT BRIEFItalian Regulator Fines Poste Italiane €12.5 Million for Invasive Data Monitoring in Payment Apps

Italy’s data‑protection authority fined Poste Italiane and its Postepay subsidiary €12.5 million for illegally harvesting device‑level data from millions of users through overly invasive mobile‑app monitoring, highlighting a major privacy‑compliance risk for third‑party payment providers.

🏭 Financial Services & FinTech🎯 Misconfiguration
High · Apr 20, 2026 · The Record
Read Full Intelligence Brief →
Page 1 of 160

Know When Your Vendors Are Breached

LiveThreat monitors this intelligence against your vendor portfolio and alerts you automatically.

Try 5 Vendors for Free →📡 Subscribe via RSS

Daily Breach Intelligence Digest

Get critical and high-severity threats delivered to your inbox every morning. Unsubscribe anytime.

RSS Feed One email per day · No spam · Unsubscribe anytime

DON'T BE A LARRY. TRY LIVETHREAT FREE.

Assess your first vendors free — no credit card, no contract, no gym membership required.

Try 5 Vendors for Free →