<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>Cybersecurity News and Magazine</title>
	<atom:link href="https://thecyberexpress.com/feed/" rel="self" type="application/rss+xml"/>
	<link>https://thecyberexpress.com</link>
	<description>Trending Cybersecurity News, Updates, Magazine and More.</description>
	<lastBuildDate>Wed, 29 Apr 2026 03:34:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://thecyberexpress.com/wp-content/uploads/tce-favicon-75x75.jpg?crop=1</url>
	<title>The Cyber Express</title>
	<link>https://thecyberexpress.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">208869986</site>	<itunes:explicit>no</itunes:explicit><itunes:subtitle>Trending Cybersecurity News, Updates, Magazine and More.</itunes:subtitle><item>
		<title>ClickUp Discloses Feature Flag Misconfiguration That Exposed 893 Customer Email Addresses and a Live API Token</title>
		<link>https://thecyberexpress.com/clickup-feature-flag-misgonfiguration-leak/</link>
		
		<dc:creator><![CDATA[Mihir Bagwe]]></dc:creator>
		<pubDate>Wed, 29 Apr 2026 03:34:18 +0000</pubDate>
				<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[API Keys]]></category>
		<category><![CDATA[ClickUp]]></category>
		<category><![CDATA[Feature Flags]]></category>
		<category><![CDATA[Misconfiguration]]></category>
		<category><![CDATA[SDKs]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111708</guid>

					<description><![CDATA[<p><img width="800" height="533" src="https://thecyberexpress.com/wp-content/uploads/ClickUp-1.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ClickUp" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/ClickUp-1.webp 800w, https://thecyberexpress.com/wp-content/uploads/ClickUp-1-300x200.webp 300w, https://thecyberexpress.com/wp-content/uploads/ClickUp-1-768x512.webp 768w, https://thecyberexpress.com/wp-content/uploads/ClickUp-1-600x400.webp 600w, https://thecyberexpress.com/wp-content/uploads/ClickUp-1-150x100.webp 150w, https://thecyberexpress.com/wp-content/uploads/ClickUp-1-750x500.webp 750w, https://thecyberexpress.com/wp-content/uploads/ClickUp-1.webp 800w, https://thecyberexpress.com/wp-content/uploads/ClickUp-1-300x200.webp 300w, https://thecyberexpress.com/wp-content/uploads/ClickUp-1-768x512.webp 768w, https://thecyberexpress.com/wp-content/uploads/ClickUp-1-600x400.webp 600w, https://thecyberexpress.com/wp-content/uploads/ClickUp-1-150x100.webp 150w, https://thecyberexpress.com/wp-content/uploads/ClickUp-1-750x500.webp 750w" sizes="(max-width: 800px) 100vw, 800px" title="ClickUp Discloses Feature Flag Misconfiguration That Exposed 893 Customer Email Addresses and a Live API Token 1"></p><p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">A security researcher's public disclosure on April 27 forced ClickUp to confront a misconfiguration its own engineering review process had missed for months. 893 customer email addresses embedded directly inside feature flag targeting rules, queryable by anyone with the platform's intentionally public client-side SDK key.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">ClickUp published its incident disclosure the following day. The company did not minimize what happened. "We should have caught this sooner. We didn't," the company said.</p>

<h3 class="font-claude-response-body break-words whitespace-normal leading-[1.7]"><strong>What Did ClickUp Expose</strong></h3>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The exposure involved two distinct issues within the same feature flag configuration system. The first was the email addresses themselves — 893 customer addresses that ClickUp engineers had embedded in flag targeting rules to control which users received specific features during staged rollouts.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The Split.io SDK's publicly queryable splitChanges endpoint returns the full set of flag definitions, including those targeting rules, to anyone holding the client-side SDK key. Because that key is intentionally embedded in ClickUp's frontend JavaScript bundle — standard, documented behavior across Split.io, LaunchDarkly, and similar platforms — the email addresses were accessible without authentication to anyone who knew where to look.</p>

<h5>Also read: <a href="https://thecyberexpress.com/moltbook-platform-exposes-1-5-mn-api-keys/">AI-Coded Moltbook Platform Exposes 1.5 Mn API Keys Through Database Misconfiguration</a></h5>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">No workspace content, passwords, billing data, or account credentials were exposed for any of the 893 affected customers, with one exception, the company <a href="https://clickup.com/blog/april-27th-update/" target="_blank" rel="nofollow noopener">said</a>.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The second and more serious issue was a single live customer API token embedded in a rate-limiting flag configuration. An on-call <a class="wpil_keyword_link" href="https://thecyberexpress.com/how-to-become-a-cyber-security-engineer/"   title="engineer" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28019">engineer</a> responding to API abuse had placed the token directly inside the flag config to throttle traffic from that workspace — a decision that made the token recoverable through the same SDK endpoint.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The token was added on October 7, 2025, and remained in the flag configuration until ClickUp invalidated it, this Monday. Log investigation showed no signs of malicious access beyond the researcher's own investigation. ClickUp said it is working directly with the affected customer.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">All 893 third-party email addresses were removed from flag configurations by Tuesday.</p>

<h3 class="font-claude-response-body break-words whitespace-normal leading-[1.7]"><strong>The Technical Root Cause</strong></h3>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The misconfiguration is architectural in nature and required no exploitation in the conventional sense. ClickUp uses Split.io for feature flag management. Client-side feature flag SDKs by design require a public-facing key embedded in the application bundle — this is how they evaluate flags for users in the browser, and it is standard behavior across the industry. The key being public is not a <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/vulnerabilities/"   title="vulnerability" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28017">vulnerability</a>.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">What made this an exposure is what ClickUp's engineers placed inside the flag configurations themselves. Flag targeting rules allow engineers to specify exactly which users receive a given feature — by email address, user ID, or other identifiers. ClickUp's teams had used customer email addresses directly in those rules for beta rollouts. Because the splitChanges endpoint returns the full flag definition set including targeting rules, and because the client-side key needed to query it was always accessible in the frontend JavaScript, those email addresses were queryable by design of the SDK — just not by design of ClickUp's intent.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">Engineers treated flag configurations as internal tooling, the company acknowledged, when the SDK architecture makes them publicly queryable by design. Flag updates at ClickUp required peer review — a process analogous to code review — but that review step did not catch the accumulation of PII in targeting rules.</p>

<h3 class="font-claude-response-body break-words whitespace-normal leading-[1.7]"><strong>The Disclosure Timeline</strong></h3>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">ClickUp's blog includes a precise timeline that addresses a specific claim circulating in public reporting: that this vulnerability went unremediated for 15 months after an initial disclosure in January 2025. ClickUp disputes that characterization and the timeline explains why.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">On January 17, 2025, a researcher reported the Split.io SDK key disclosure to ClickUp's bug bounty program, which was then hosted on BugCrowd. ClickUp and BugCrowd classified that report as informational — because the client-side SDK key alone is not a vulnerability. It is public by design. That classification was correct given the report's contents, ClickUp says, because the email addresses embedded in the flag configurations were not included in that original report.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">ClickUp migrated its bug bounty program from BugCrowd to HackerOne on June 3, 2025, with all past reports carried over.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">On April 8, 2026, the researcher filed a new, detailed report on HackerOne — a different report from the January 2025 submission — documenting the expanded impact of 893 customer email addresses in flag targeting rules and the embedded API token. ClickUp says it was not aware of the email address exposure until April 27, the day the researcher went public. The company says the flag configurations themselves were not included in the original 2025 report, and the "15 months" framing conflates two separate reports about two different findings.</p>

<h3 class="font-claude-response-body break-words whitespace-normal leading-[1.7]"><strong>What ClickUp Has Changed</strong></h3>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">ClickUp described four remediation steps taken in the immediate aftermath. All customer email addresses were purged from flag targeting rules and replaced with internal user identifiers that carry no PII. The company has implemented automated tooling to detect email addresses and credential patterns in flag configurations before they can be saved. A secrets scanning step has been added to the flag configuration deployment pipeline. And the engineering team has updated its internal guidance on what <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28018">data</a> is permissible inside flag targeting rules.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The peer review process that existed prior to the incident — a required +1 approval on all flag changes — remains in place but clearly did not catch this class of misconfiguration. The new automated tooling is designed to fill that gap at the system level rather than relying on reviewers to catch it manually.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">Customers whose email addresses were among the 893 affected were notified directly by ClickUp on or before April 29, 2026. Customers who did not receive a direct communication were not in the exposed list.</p>]]></description>
										<content:encoded><![CDATA[<p><img width="800" height="533" src="https://thecyberexpress.com/wp-content/uploads/ClickUp-1.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ClickUp" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/ClickUp-1.webp 800w, https://thecyberexpress.com/wp-content/uploads/ClickUp-1-300x200.webp 300w, https://thecyberexpress.com/wp-content/uploads/ClickUp-1-768x512.webp 768w, https://thecyberexpress.com/wp-content/uploads/ClickUp-1-600x400.webp 600w, https://thecyberexpress.com/wp-content/uploads/ClickUp-1-150x100.webp 150w, https://thecyberexpress.com/wp-content/uploads/ClickUp-1-750x500.webp 750w, https://thecyberexpress.com/wp-content/uploads/ClickUp-1.webp 800w, https://thecyberexpress.com/wp-content/uploads/ClickUp-1-300x200.webp 300w, https://thecyberexpress.com/wp-content/uploads/ClickUp-1-768x512.webp 768w, https://thecyberexpress.com/wp-content/uploads/ClickUp-1-600x400.webp 600w, https://thecyberexpress.com/wp-content/uploads/ClickUp-1-150x100.webp 150w, https://thecyberexpress.com/wp-content/uploads/ClickUp-1-750x500.webp 750w" sizes="(max-width: 800px) 100vw, 800px" title="ClickUp Discloses Feature Flag Misconfiguration That Exposed 893 Customer Email Addresses and a Live API Token 2"></p><p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">A security researcher's public disclosure on April 27 forced ClickUp to confront a misconfiguration its own engineering review process had missed for months. 893 customer email addresses embedded directly inside feature flag targeting rules, queryable by anyone with the platform's intentionally public client-side SDK key.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">ClickUp published its incident disclosure the following day. The company did not minimize what happened. "We should have caught this sooner. We didn't," the company said.</p>

<h3 class="font-claude-response-body break-words whitespace-normal leading-[1.7]"><strong>What Did ClickUp Expose</strong></h3>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The exposure involved two distinct issues within the same feature flag configuration system. The first was the email addresses themselves — 893 customer addresses that ClickUp engineers had embedded in flag targeting rules to control which users received specific features during staged rollouts.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The Split.io SDK's publicly queryable splitChanges endpoint returns the full set of flag definitions, including those targeting rules, to anyone holding the client-side SDK key. Because that key is intentionally embedded in ClickUp's frontend JavaScript bundle — standard, documented behavior across Split.io, LaunchDarkly, and similar platforms — the email addresses were accessible without authentication to anyone who knew where to look.</p>

<h5>Also read: <a href="https://thecyberexpress.com/moltbook-platform-exposes-1-5-mn-api-keys/">AI-Coded Moltbook Platform Exposes 1.5 Mn API Keys Through Database Misconfiguration</a></h5>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">No workspace content, passwords, billing data, or account credentials were exposed for any of the 893 affected customers, with one exception, the company <a href="https://clickup.com/blog/april-27th-update/" target="_blank" rel="nofollow noopener">said</a>.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The second and more serious issue was a single live customer API token embedded in a rate-limiting flag configuration. An on-call <a class="wpil_keyword_link" href="https://thecyberexpress.com/how-to-become-a-cyber-security-engineer/"   title="engineer" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28019">engineer</a> responding to API abuse had placed the token directly inside the flag config to throttle traffic from that workspace — a decision that made the token recoverable through the same SDK endpoint.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The token was added on October 7, 2025, and remained in the flag configuration until ClickUp invalidated it, this Monday. Log investigation showed no signs of malicious access beyond the researcher's own investigation. ClickUp said it is working directly with the affected customer.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">All 893 third-party email addresses were removed from flag configurations by Tuesday.</p>

<h3 class="font-claude-response-body break-words whitespace-normal leading-[1.7]"><strong>The Technical Root Cause</strong></h3>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The misconfiguration is architectural in nature and required no exploitation in the conventional sense. ClickUp uses Split.io for feature flag management. Client-side feature flag SDKs by design require a public-facing key embedded in the application bundle — this is how they evaluate flags for users in the browser, and it is standard behavior across the industry. The key being public is not a <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/vulnerabilities/"   title="vulnerability" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28017">vulnerability</a>.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">What made this an exposure is what ClickUp's engineers placed inside the flag configurations themselves. Flag targeting rules allow engineers to specify exactly which users receive a given feature — by email address, user ID, or other identifiers. ClickUp's teams had used customer email addresses directly in those rules for beta rollouts. Because the splitChanges endpoint returns the full flag definition set including targeting rules, and because the client-side key needed to query it was always accessible in the frontend JavaScript, those email addresses were queryable by design of the SDK — just not by design of ClickUp's intent.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">Engineers treated flag configurations as internal tooling, the company acknowledged, when the SDK architecture makes them publicly queryable by design. Flag updates at ClickUp required peer review — a process analogous to code review — but that review step did not catch the accumulation of PII in targeting rules.</p>

<h3 class="font-claude-response-body break-words whitespace-normal leading-[1.7]"><strong>The Disclosure Timeline</strong></h3>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">ClickUp's blog includes a precise timeline that addresses a specific claim circulating in public reporting: that this vulnerability went unremediated for 15 months after an initial disclosure in January 2025. ClickUp disputes that characterization and the timeline explains why.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">On January 17, 2025, a researcher reported the Split.io SDK key disclosure to ClickUp's bug bounty program, which was then hosted on BugCrowd. ClickUp and BugCrowd classified that report as informational — because the client-side SDK key alone is not a vulnerability. It is public by design. That classification was correct given the report's contents, ClickUp says, because the email addresses embedded in the flag configurations were not included in that original report.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">ClickUp migrated its bug bounty program from BugCrowd to HackerOne on June 3, 2025, with all past reports carried over.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">On April 8, 2026, the researcher filed a new, detailed report on HackerOne — a different report from the January 2025 submission — documenting the expanded impact of 893 customer email addresses in flag targeting rules and the embedded API token. ClickUp says it was not aware of the email address exposure until April 27, the day the researcher went public. The company says the flag configurations themselves were not included in the original 2025 report, and the "15 months" framing conflates two separate reports about two different findings.</p>

<h3 class="font-claude-response-body break-words whitespace-normal leading-[1.7]"><strong>What ClickUp Has Changed</strong></h3>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">ClickUp described four remediation steps taken in the immediate aftermath. All customer email addresses were purged from flag targeting rules and replaced with internal user identifiers that carry no PII. The company has implemented automated tooling to detect email addresses and credential patterns in flag configurations before they can be saved. A secrets scanning step has been added to the flag configuration deployment pipeline. And the engineering team has updated its internal guidance on what <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28018">data</a> is permissible inside flag targeting rules.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The peer review process that existed prior to the incident — a required +1 approval on all flag changes — remains in place but clearly did not catch this class of misconfiguration. The new automated tooling is designed to fill that gap at the system level rather than relying on reviewers to catch it manually.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">Customers whose email addresses were among the 893 affected were notified directly by ClickUp on or before April 29, 2026. Customers who did not receive a direct communication were not in the exposed list.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111708</post-id>	</item>
		<item>
		<title>Cybersecurity Incident Strikes Contractor Handling JRL MRT Stations and NEWater Factory 3 Projects</title>
		<link>https://thecyberexpress.com/cyber-incident-shanghai-tunnel-engineering-co/</link>
		
		<dc:creator><![CDATA[Ashish Khaitan]]></dc:creator>
		<pubDate>Tue, 28 Apr 2026 10:29:17 +0000</pubDate>
				<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Changi NEWater Factory]]></category>
		<category><![CDATA[JRL]]></category>
		<category><![CDATA[Land Transport Authority]]></category>
		<category><![CDATA[Shanghai Tunnel]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111689</guid>

					<description><![CDATA[<p><img width="1101" height="614" src="https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Shanghai Tunnel" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel.webp 1101w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-750x418.webp 750w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel.webp 1101w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-750x418.webp 750w" sizes="(max-width: 1101px) 100vw, 1101px" title="Cybersecurity Incident Strikes Contractor Handling JRL MRT Stations and NEWater Factory 3 Projects 3"></p>A cybersecurity incident has raised concerns after it was revealed that sensitive data associated with the Jurong Region Line (JRL) MRT stations and the Changi NEWater Factory 3 were compromised. The contractor responsible for both critical infrastructure projects, Shanghai Tunnel Engineering Co (Singapore), is currently facing scrutiny as authorities investigate the breach.
<h3 aria-level="2"><b><span data-contrast="none">Data Compromise Involving Shanghai Tunnel Engineering Co</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
The breach primarily affects the civil engineering firm Shanghai Tunnel Engineering Co, which has been engaged in the construction of three key stations along the JRL and the new Changi NEWater Factory 3. While the exact timing of the incident remains unclear, the compromised <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28015">data</a> has since been identified as tender documents for the projects. These documents, however, are available on the government’s GeBIZ procurement portal, which mitigates concerns over the theft of sensitive information.

On April 27, the Land Transport Authority (LTA) responded to public queries by confirming that it was aware of the <a id="menuron" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://thecyberexpress.com/european-space-agency-confirms-cyber-incident/" href="https://thecyberexpress.com/european-space-agency-confirms-cyber-incident/" target="_blank" rel="noreferrer noopener" aria-label="Link cybersecurity breach">cybersecurity breach</a> and had reported the matter to the police and other relevant authorities. In an effort to minimize potential <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risks" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28014">risks</a>, the LTA temporarily suspended the contractor’s access to its digital systems, although the breach has not been reported to have disrupted the ongoing construction of the JRL MRT stations.
<h3 aria-level="2"><b><span data-contrast="none">Impact on Changi NEWater Factory 3</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
While the <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-a-data-breach/" target="_blank"  rel="noopener" title="data breach" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28013">data breach</a> raises alarms, the national water agency PUB (Public Utilities Board) has reassured the public that there has been no access to its digital systems by Shanghai Tunnel Engineering Co. Following an internal investigation, PUB concluded that no sensitive data related to the Changi NEWater Factory 3 had been stolen. The only data compromised were the project tender documents, which, as mentioned, are publicly accessible on GeBIZ.

A <a id="menurop" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://www.straitstimes.com/singapore/contractor-building-jrl-stations-and-newater-factory-hit-by-data-breach" href="https://www.straitstimes.com/singapore/contractor-building-jrl-stations-and-newater-factory-hit-by-data-breach" target="_blank" rel="noreferrer noopener" aria-label="Link PUB spokesperson emphasized">PUB spokesperson emphasized</a> that the agency maintains a "serious view" of cybersecurity and has advised the contractor to review its security protocols. Despite extensive checks on known ransomware portals and <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-a-hacker/"   title="hacker" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28012">hacker</a> forums, no evidence of leaked data related to the breach has surfaced, alleviating some concerns among stakeholders.
<h3 aria-level="2"><b><span data-contrast="none">Company’s Response to Cybersecurity Incident</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
In a statement issued on April 28, Shanghai Tunnel Engineering Co (Singapore) acknowledged the <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-cybersecurity/"   title="cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28011">cybersecurity</a> incident, confirming that it had taken immediate steps to contain the situation. While the company did not specify when the breach occurred, it assured the public that it was cooperating fully with the authorities. Furthermore, the company has enlisted an external <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-cybersecurity/" target="_blank"  rel="noopener" title="cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28016">cybersecurity</a> specialist to aid in the investigation.

"We are cooperating fully with the relevant authorities and kindly request that all parties allow the investigation to proceed without interference," a company representative said.

Shanghai Tunnel Engineering Co, established in 1996, is a well-established contractor with significant experience in MRT projects across Singapore. The firm has previously worked on various stations for the Circle, Downtown, and Thomson-East Coast lines. Its latest projects involve critical infrastructure, including the JRL stations and the Changi NEWater Factory 3.
<h3 aria-level="2"><b><span data-contrast="none">Contract Details and Future Expectations</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
In 2019, Shanghai Tunnel Engineering Co was awarded a $465.2 million contract to design and build three JRL stations, Choa Chu Kang, Choa Chu Kang West, and Tengah—along with a 4.3km viaduct connecting them. This work includes integrating the existing Choa Chu Kang MRT station on the North-South Line into the JRL network.

In addition to the JRL projects, Shanghai Tunnel Engineering Co is also involved in the construction of the Changi NEWater Factory 3. In November 2025, a $205 million contract was awarded to Sanli M&amp;E Engineering, which formed a joint venture with Shanghai Tunnel Engineering Co in February 2026. The joint venture will be responsible for several key aspects of the factory’s construction, including civil, structural, and architectural works, as well as external and building services.

The Changi NEWater Factory 3 is expected to be operational by 2028 and will replace the existing Bedok facility. Once completed, the factory will be capable of producing up to 50 million gallons of NEWater daily, contributing significantly to Singapore's water sustainability efforts.]]></description>
										<content:encoded><![CDATA[<p><img width="1101" height="614" src="https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Shanghai Tunnel" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel.webp 1101w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-750x418.webp 750w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel.webp 1101w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-750x418.webp 750w" sizes="(max-width: 1101px) 100vw, 1101px" title="Cybersecurity Incident Strikes Contractor Handling JRL MRT Stations and NEWater Factory 3 Projects 4"></p>A cybersecurity incident has raised concerns after it was revealed that sensitive data associated with the Jurong Region Line (JRL) MRT stations and the Changi NEWater Factory 3 were compromised. The contractor responsible for both critical infrastructure projects, Shanghai Tunnel Engineering Co (Singapore), is currently facing scrutiny as authorities investigate the breach.
<h3 aria-level="2"><b><span data-contrast="none">Data Compromise Involving Shanghai Tunnel Engineering Co</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
The breach primarily affects the civil engineering firm Shanghai Tunnel Engineering Co, which has been engaged in the construction of three key stations along the JRL and the new Changi NEWater Factory 3. While the exact timing of the incident remains unclear, the compromised <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28015">data</a> has since been identified as tender documents for the projects. These documents, however, are available on the government’s GeBIZ procurement portal, which mitigates concerns over the theft of sensitive information.

On April 27, the Land Transport Authority (LTA) responded to public queries by confirming that it was aware of the <a id="menuron" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://thecyberexpress.com/european-space-agency-confirms-cyber-incident/" href="https://thecyberexpress.com/european-space-agency-confirms-cyber-incident/" target="_blank" rel="noreferrer noopener" aria-label="Link cybersecurity breach">cybersecurity breach</a> and had reported the matter to the police and other relevant authorities. In an effort to minimize potential <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risks" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28014">risks</a>, the LTA temporarily suspended the contractor’s access to its digital systems, although the breach has not been reported to have disrupted the ongoing construction of the JRL MRT stations.
<h3 aria-level="2"><b><span data-contrast="none">Impact on Changi NEWater Factory 3</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
While the <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-a-data-breach/" target="_blank"  rel="noopener" title="data breach" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28013">data breach</a> raises alarms, the national water agency PUB (Public Utilities Board) has reassured the public that there has been no access to its digital systems by Shanghai Tunnel Engineering Co. Following an internal investigation, PUB concluded that no sensitive data related to the Changi NEWater Factory 3 had been stolen. The only data compromised were the project tender documents, which, as mentioned, are publicly accessible on GeBIZ.

A <a id="menurop" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://www.straitstimes.com/singapore/contractor-building-jrl-stations-and-newater-factory-hit-by-data-breach" href="https://www.straitstimes.com/singapore/contractor-building-jrl-stations-and-newater-factory-hit-by-data-breach" target="_blank" rel="noreferrer noopener" aria-label="Link PUB spokesperson emphasized">PUB spokesperson emphasized</a> that the agency maintains a "serious view" of cybersecurity and has advised the contractor to review its security protocols. Despite extensive checks on known ransomware portals and <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-a-hacker/"   title="hacker" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28012">hacker</a> forums, no evidence of leaked data related to the breach has surfaced, alleviating some concerns among stakeholders.
<h3 aria-level="2"><b><span data-contrast="none">Company’s Response to Cybersecurity Incident</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
In a statement issued on April 28, Shanghai Tunnel Engineering Co (Singapore) acknowledged the <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-cybersecurity/"   title="cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28011">cybersecurity</a> incident, confirming that it had taken immediate steps to contain the situation. While the company did not specify when the breach occurred, it assured the public that it was cooperating fully with the authorities. Furthermore, the company has enlisted an external <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-cybersecurity/" target="_blank"  rel="noopener" title="cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28016">cybersecurity</a> specialist to aid in the investigation.

"We are cooperating fully with the relevant authorities and kindly request that all parties allow the investigation to proceed without interference," a company representative said.

Shanghai Tunnel Engineering Co, established in 1996, is a well-established contractor with significant experience in MRT projects across Singapore. The firm has previously worked on various stations for the Circle, Downtown, and Thomson-East Coast lines. Its latest projects involve critical infrastructure, including the JRL stations and the Changi NEWater Factory 3.
<h3 aria-level="2"><b><span data-contrast="none">Contract Details and Future Expectations</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
In 2019, Shanghai Tunnel Engineering Co was awarded a $465.2 million contract to design and build three JRL stations, Choa Chu Kang, Choa Chu Kang West, and Tengah—along with a 4.3km viaduct connecting them. This work includes integrating the existing Choa Chu Kang MRT station on the North-South Line into the JRL network.

In addition to the JRL projects, Shanghai Tunnel Engineering Co is also involved in the construction of the Changi NEWater Factory 3. In November 2025, a $205 million contract was awarded to Sanli M&amp;E Engineering, which formed a joint venture with Shanghai Tunnel Engineering Co in February 2026. The joint venture will be responsible for several key aspects of the factory’s construction, including civil, structural, and architectural works, as well as external and building services.

The Changi NEWater Factory 3 is expected to be operational by 2028 and will replace the existing Bedok facility. Once completed, the factory will be capable of producing up to 50 million gallons of NEWater daily, contributing significantly to Singapore's water sustainability efforts.]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111689</post-id>	</item>
		<item>
		<title>Medtronic Confirms Data Breach, No Impact on Operations or Patient Safety</title>
		<link>https://thecyberexpress.com/medtronic-data-breach-april-2026/</link>
		
		<dc:creator><![CDATA[Ashish Khaitan]]></dc:creator>
		<pubDate>Tue, 28 Apr 2026 10:25:21 +0000</pubDate>
				<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Data Breach News]]></category>
		<category><![CDATA[data breach at Medtronic]]></category>
		<category><![CDATA[Medtronic data breach]]></category>
		<category><![CDATA[SEC]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111694</guid>

					<description><![CDATA[<p><img width="1101" height="614" src="https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Medtronic data breach" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach.webp 1101w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-750x418.webp 750w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach.webp 1101w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-750x418.webp 750w" sizes="(max-width: 1101px) 100vw, 1101px" title="Medtronic Confirms Data Breach, No Impact on Operations or Patient Safety 5"></p>Medtronic, the global leader in medical technology, disclosed a data breach affecting its corporate IT systems. On April 24, the company confirmed that an unauthorized third party gained access to certain systems, although the Medtronic data breach is not expected to have any material impact on the company’s financial performance or business operations.

The breach has raised concerns across the healthcare and medtech sectors, but Medtronic assured investors and customers that it had taken immediate action to contain the situation.
<h3 aria-level="2"><b><span data-contrast="none">What Happened to the Medtronic Data Breach?</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
The Medtronic <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28009">data</a> breach, which was identified on April 24, involved unauthorized access to some of Medtronic’s corporate IT systems. However, the company was quick to clarify that no disruption had occurred in key operational areas, including product safety, customer connections, and manufacturing or distribution activities. Importantly, there was no reported impact on patient safety or the company’s ability to meet its patient care commitments.

In a <a id="menurob" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://app.quotemedia.com/data/downloadfiling?webmasterid=101533&amp;ref=319979674&amp;type=pdf&amp;symbol=mdt&amp;cdn=83dd8d0bda390cc08b7e0796ad099fb8&amp;companyname=medtronic+plc.&amp;formtype=8-k&amp;datefiled=2026-04-27" href="https://app.quotemedia.com/data/downloadFiling?webmasterId=101533&amp;ref=319979674&amp;type=PDF&amp;symbol=MDT&amp;cdn=83dd8d0bda390cc08b7e0796ad099fb8&amp;companyName=Medtronic+plc.&amp;formType=8-K&amp;dateFiled=2026-04-27" target="_blank" rel="noreferrer noopener" aria-label="Link public filing">public filing</a> with the U.S. Securities and Exchange Commission (SEC), Medtronic stated, “We have not identified any impact to our products, patient safety, connections to our customers, our manufacturing and distribution operations, or our financial reporting systems.” The company emphasized that the networks supporting corporate IT systems are separate from those used for products, manufacturing, and distribution, which remain unaffected by the breach.

Additionally, Medtronic <a id="menurod" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://news.medtronic.com/medtronic-statement-on-unauthorized-system-access" href="https://news.medtronic.com/Medtronic-statement-on-unauthorized-system-access" target="_blank" rel="noreferrer noopener" aria-label="Link highlighted">highlighted</a> that the IT systems supporting <a id="menurof" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://thecyberexpress.com/cyberattacks-on-hospitals-by-uac-0247-hackers/" href="https://thecyberexpress.com/cyberattacks-on-hospitals-by-uac-0247-hackers/" target="_blank" rel="noreferrer noopener" aria-label="Link hospitals">hospitals</a> and healthcare customers are managed separately and secured by the customers’ IT teams. As such, hospital networks were not impacted by the breach, nor was there any disruption to hospital operations or services.
<h3 aria-level="2"><b><span data-contrast="none">Immediate Actions Taken by Medtronic</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
Following the identification of the breach, Medtronic moved quickly to contain the incident. The company activated its incident response protocols and sought assistance from <a id="menuroh" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://thecyberexpress.com/cybersecurity-experts-arrested/" href="https://thecyberexpress.com/cybersecurity-experts-arrested/" target="_blank" rel="noreferrer noopener" aria-label="Link cybersecurity experts">cybersecurity experts</a> to investigate the breach and implement necessary remediation measures.

Medtronic has also initiated an effort to determine if any personal information was accessed during the breach. If any sensitive data has been compromised, the company assured it would provide necessary notifications and support services to affected individuals.

The company remains committed to enhancing its <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-cybersecurity/" target="_blank"  rel="noopener" title="cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28005">cybersecurity</a> measures. “We are simultaneously identifying additional ways to further optimize our system <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28010">security</a>,” said a Medtronic spokesperson. The company has also assured its stakeholders that it does not expect the incident to have an impact on its financial results or overall business operations.
<h3 aria-level="2"><b><span data-contrast="none">The Broader Impact on the Medtech Sector</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
The <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-a-data-breach/" target="_blank"  rel="noopener" title="data breach" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28008">data breach</a> at Medtronic follows a series of similar cybersecurity incidents that have affected other companies in the medtech industry. In March 2026, a cyberattack disrupted operations at <a id="menuroj" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://thecyberexpress.com/endpoint-management-systems-cisa/" href="https://thecyberexpress.com/endpoint-management-systems-cisa/" target="_blank" rel="noreferrer noopener" aria-label="Link Stryker">Stryker</a>, another major player in the medical technology sector. The attack targeted Stryker’s Microsoft environment, affecting ordering, shipping, and manufacturing processes. It took several weeks for Stryker to fully recover and return to normal operations.

Simultaneously, Intuitive Surgical, a leading manufacturer of surgical robots, reported a <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-phishing/" target="_blank"  rel="noopener" title="phishing" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28006">phishing</a> incident. The unauthorized party gained access to sensitive customer, employee, and corporate data. Intuitive Surgical also claimed that the issue was contained without significant financial impact, echoing Medtronic’s own assessment that the data breach would not affect its financial standing.

These incidents highlight the frequency and sophistication of cyberattacks within the <a id="menurol" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://thecyberexpress.com/signature-healthcare-cyberattack/" href="https://thecyberexpress.com/signature-healthcare-cyberattack/" target="_blank" rel="noreferrer noopener" aria-label="Link healthcare">healthcare</a> and medtech industries. As digital transformation accelerates in these sectors, companies are vulnerable to <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyber" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28007">cyber</a> threats.]]></description>
										<content:encoded><![CDATA[<p><img width="1101" height="614" src="https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Medtronic data breach" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach.webp 1101w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-750x418.webp 750w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach.webp 1101w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-750x418.webp 750w" sizes="(max-width: 1101px) 100vw, 1101px" title="Medtronic Confirms Data Breach, No Impact on Operations or Patient Safety 6"></p>Medtronic, the global leader in medical technology, disclosed a data breach affecting its corporate IT systems. On April 24, the company confirmed that an unauthorized third party gained access to certain systems, although the Medtronic data breach is not expected to have any material impact on the company’s financial performance or business operations.

The breach has raised concerns across the healthcare and medtech sectors, but Medtronic assured investors and customers that it had taken immediate action to contain the situation.
<h3 aria-level="2"><b><span data-contrast="none">What Happened to the Medtronic Data Breach?</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
The Medtronic <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28009">data</a> breach, which was identified on April 24, involved unauthorized access to some of Medtronic’s corporate IT systems. However, the company was quick to clarify that no disruption had occurred in key operational areas, including product safety, customer connections, and manufacturing or distribution activities. Importantly, there was no reported impact on patient safety or the company’s ability to meet its patient care commitments.

In a <a id="menurob" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://app.quotemedia.com/data/downloadfiling?webmasterid=101533&amp;ref=319979674&amp;type=pdf&amp;symbol=mdt&amp;cdn=83dd8d0bda390cc08b7e0796ad099fb8&amp;companyname=medtronic+plc.&amp;formtype=8-k&amp;datefiled=2026-04-27" href="https://app.quotemedia.com/data/downloadFiling?webmasterId=101533&amp;ref=319979674&amp;type=PDF&amp;symbol=MDT&amp;cdn=83dd8d0bda390cc08b7e0796ad099fb8&amp;companyName=Medtronic+plc.&amp;formType=8-K&amp;dateFiled=2026-04-27" target="_blank" rel="noreferrer noopener" aria-label="Link public filing">public filing</a> with the U.S. Securities and Exchange Commission (SEC), Medtronic stated, “We have not identified any impact to our products, patient safety, connections to our customers, our manufacturing and distribution operations, or our financial reporting systems.” The company emphasized that the networks supporting corporate IT systems are separate from those used for products, manufacturing, and distribution, which remain unaffected by the breach.

Additionally, Medtronic <a id="menurod" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://news.medtronic.com/medtronic-statement-on-unauthorized-system-access" href="https://news.medtronic.com/Medtronic-statement-on-unauthorized-system-access" target="_blank" rel="noreferrer noopener" aria-label="Link highlighted">highlighted</a> that the IT systems supporting <a id="menurof" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://thecyberexpress.com/cyberattacks-on-hospitals-by-uac-0247-hackers/" href="https://thecyberexpress.com/cyberattacks-on-hospitals-by-uac-0247-hackers/" target="_blank" rel="noreferrer noopener" aria-label="Link hospitals">hospitals</a> and healthcare customers are managed separately and secured by the customers’ IT teams. As such, hospital networks were not impacted by the breach, nor was there any disruption to hospital operations or services.
<h3 aria-level="2"><b><span data-contrast="none">Immediate Actions Taken by Medtronic</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
Following the identification of the breach, Medtronic moved quickly to contain the incident. The company activated its incident response protocols and sought assistance from <a id="menuroh" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://thecyberexpress.com/cybersecurity-experts-arrested/" href="https://thecyberexpress.com/cybersecurity-experts-arrested/" target="_blank" rel="noreferrer noopener" aria-label="Link cybersecurity experts">cybersecurity experts</a> to investigate the breach and implement necessary remediation measures.

Medtronic has also initiated an effort to determine if any personal information was accessed during the breach. If any sensitive data has been compromised, the company assured it would provide necessary notifications and support services to affected individuals.

The company remains committed to enhancing its <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-cybersecurity/" target="_blank"  rel="noopener" title="cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28005">cybersecurity</a> measures. “We are simultaneously identifying additional ways to further optimize our system <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28010">security</a>,” said a Medtronic spokesperson. The company has also assured its stakeholders that it does not expect the incident to have an impact on its financial results or overall business operations.
<h3 aria-level="2"><b><span data-contrast="none">The Broader Impact on the Medtech Sector</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
The <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-a-data-breach/" target="_blank"  rel="noopener" title="data breach" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28008">data breach</a> at Medtronic follows a series of similar cybersecurity incidents that have affected other companies in the medtech industry. In March 2026, a cyberattack disrupted operations at <a id="menuroj" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://thecyberexpress.com/endpoint-management-systems-cisa/" href="https://thecyberexpress.com/endpoint-management-systems-cisa/" target="_blank" rel="noreferrer noopener" aria-label="Link Stryker">Stryker</a>, another major player in the medical technology sector. The attack targeted Stryker’s Microsoft environment, affecting ordering, shipping, and manufacturing processes. It took several weeks for Stryker to fully recover and return to normal operations.

Simultaneously, Intuitive Surgical, a leading manufacturer of surgical robots, reported a <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-phishing/" target="_blank"  rel="noopener" title="phishing" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28006">phishing</a> incident. The unauthorized party gained access to sensitive customer, employee, and corporate data. Intuitive Surgical also claimed that the issue was contained without significant financial impact, echoing Medtronic’s own assessment that the data breach would not affect its financial standing.

These incidents highlight the frequency and sophistication of cyberattacks within the <a id="menurol" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://thecyberexpress.com/signature-healthcare-cyberattack/" href="https://thecyberexpress.com/signature-healthcare-cyberattack/" target="_blank" rel="noreferrer noopener" aria-label="Link healthcare">healthcare</a> and medtech industries. As digital transformation accelerates in these sectors, companies are vulnerable to <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyber" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28007">cyber</a> threats.]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111694</post-id>	</item>
		<item>
		<title>Notepad++ Releases 8.9.4 Patch to Fix String Injection Vulnerability (CVE-2026-3008) in 8.9.3</title>
		<link>https://thecyberexpress.com/notepad-cve-2026-3008-vulnerability/</link>
		
		<dc:creator><![CDATA[Ashish Khaitan]]></dc:creator>
		<pubDate>Tue, 28 Apr 2026 10:20:13 +0000</pubDate>
				<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[Vulnerability News]]></category>
		<category><![CDATA[CVE-2026-3008]]></category>
		<category><![CDATA[Notepad++]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111698</guid>

					<description><![CDATA[<p><img width="1101" height="614" src="https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CVE-2026-3008" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008.webp 1101w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-750x418.webp 750w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008.webp 1101w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-750x418.webp 750w" sizes="(max-width: 1101px) 100vw, 1101px" title="Notepad++ Releases 8.9.4 Patch to Fix String Injection Vulnerability (CVE-2026-3008) in 8.9.3 7"></p>A vulnerability has been identified in the popular open-source text editor, Notepad++, with the release of CVE-2026-3008. The vulnerability, discovered and reported by CSA under its Responsibility Vulnerability Disclosure Policy, is linked to a potential string injection flaw in Notepad++ version 8.9.3. To mitigate the risk associated with this vulnerability, users and administrators are strongly urged to update their installations to version 8.9.4 immediately.
<h3 aria-level="2"><b><span data-contrast="none">A Deeper Look at CVE-2026-3008</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
The CVE-2026-3008 bug addresses a string-injection <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/vulnerabilities/"   title="vulnerability" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28000">vulnerability</a> in Notepad++, a widely used text editor for software development, writing, and other professional environments. The vulnerability allows attackers to <a class="wpil_keyword_link" href="https://cyble.com/exploit/" target="_blank"  rel="noopener" title="exploit" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28004">exploit</a> it, potentially gaining access to sensitive memory to read information or, in some cases, causing the application to crash.

This flaw was first flagged by a contributor, Hazley Samsudin, whose prompt reporting allowed the Notepad++ team to act swiftly to resolve the issue.  As part of Notepad++'s ongoing <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27998">security</a> commitment, the Product Owner quickly released an official patch in version 8.9.4 to rectify the issue, ensuring the software remains secure for all users.
<h3 aria-level="2"><b><span data-contrast="none">The Impact of CVE-2026-3008 on Notepad++ Users</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
The vulnerability in Notepad++ version 8.9.3 has the potential for significant impacts on users. If successfully exploited, attackers could manipulate the string <a id="menurd8" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://thecyberexpress.com/command-injection-vulnerability-in-cisco-urwb/" href="https://thecyberexpress.com/command-injection-vulnerability-in-cisco-urwb/" target="_blank" rel="noreferrer noopener" aria-label="Link injection vulnerability">injection vulnerability</a> to access memory addresses or even crash the application entirely. This could compromise the integrity of unsaved <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27999">data</a> or disrupt workflow, particularly in environments where Notepad++ is a critical tool for coding or note-taking.

While this vulnerability may not allow for direct execution of arbitrary code, its potential for causing application crashes poses a <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risk" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28001">risk</a> to stability, especially if users are working with large or complex files. Given the widespread use of Notepad++ across multiple industries, it is crucial for users to take immediate action by upgrading to the secure 8.9.4 version.
<h3 aria-level="2"><b><span data-contrast="none">Affected Versions of Notepad++</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">The vulnerability (CVE-2026-3008) is present exclusively in Notepad++ version 8.9.3. Therefore, anyone using this version or earlier versions is at risk of <a href="https://thecyberexpress.com/forticlientems-flaws-under-active-exploitation/" target="_blank" rel="noopener">exploitation</a>. The update to version 8.9.4, which includes necessary security patches, should be prioritized to prevent any potential exploitation of this vulnerability.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Users of Notepad++ are strongly encouraged to update their installations to the latest version, 8.9.4, which has been designed to address the <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/"   title="vulnerabilities" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28002">vulnerabilities</a> identified, including CVE-2026-3008. The Notepad++ development team worked quickly to release this update, which also includes a series of bug fixes and performance improvements.</span>

<span data-contrast="auto">To ensure that systems remain secure, users can download the latest release directly from the official Notepad++ website or the <a href="https://thecyberexpress.com/researchers-exploit-github-actions-artifacts/" target="_blank" rel="noopener">GitHub repository</a>. Administrators managing multiple machines should push the update across their networks to guarantee all affected systems are secured.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">In addition to this update, Notepad++ version 8.9.4 includes several other improvements aimed at enhancing the software's overall stability and performance. These include fixes for crashes related to undo actions, improvements to file path handling, and updates to Scintilla and Lexilla for better language processing.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Notable Fixes in Notepad++ v8.9.4</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">The <a href="https://community.notepad-plus-plus.org/topic/27500/notepad-v8-9-4-release-candidate/3" target="_blank" rel="nofollow noopener">v8.9.4 update</a> not only resolves the CVE-2026-3008 vulnerability but also brings a host of other important bug fixes and stability improvements. Some of the notable changes include:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<ul>
 	<li><b><span data-contrast="auto">Fixes to Crashes</span></b><span data-contrast="auto">: Issues such as crashes when using the FindInFiles feature or when dropping files with long paths (over 259 characters) have been addressed. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><b><span data-contrast="auto">Undo Action Issues</span></b><span data-contrast="auto">: Previous versions had an issue with crashes caused by undoing actions in the column editor, especially when bad inputs were entered. This issue has now been resolved. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><b><span data-contrast="auto">UI and Rendering Fixes</span></b><span data-contrast="auto">: Improvements have been made to the user interface, including fixes for visual glitches in the Mark dialog and <a class="wpil_keyword_link" href="https://thecyberexpress.com/how-to-password-protect-a-word-document/"   title="Document" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28003">Document</a> List view. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><b><span data-contrast="auto">Improved Language Support</span></b><span data-contrast="auto">: Updates to Scintilla and Lexilla provide better handling of C++ 11 raw string literals and enhanced syntax highlighting for various file formats. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<span data-contrast="auto">Additionally, the update addresses installation issues that impacted users of the MSI installer, including problems with context menu registrations and incorrect hexadecimal display names during installation.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>]]></description>
										<content:encoded><![CDATA[<p><img width="1101" height="614" src="https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CVE-2026-3008" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008.webp 1101w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-750x418.webp 750w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008.webp 1101w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-750x418.webp 750w" sizes="(max-width: 1101px) 100vw, 1101px" title="Notepad++ Releases 8.9.4 Patch to Fix String Injection Vulnerability (CVE-2026-3008) in 8.9.3 8"></p>A vulnerability has been identified in the popular open-source text editor, Notepad++, with the release of CVE-2026-3008. The vulnerability, discovered and reported by CSA under its Responsibility Vulnerability Disclosure Policy, is linked to a potential string injection flaw in Notepad++ version 8.9.3. To mitigate the risk associated with this vulnerability, users and administrators are strongly urged to update their installations to version 8.9.4 immediately.
<h3 aria-level="2"><b><span data-contrast="none">A Deeper Look at CVE-2026-3008</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
The CVE-2026-3008 bug addresses a string-injection <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/vulnerabilities/"   title="vulnerability" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28000">vulnerability</a> in Notepad++, a widely used text editor for software development, writing, and other professional environments. The vulnerability allows attackers to <a class="wpil_keyword_link" href="https://cyble.com/exploit/" target="_blank"  rel="noopener" title="exploit" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28004">exploit</a> it, potentially gaining access to sensitive memory to read information or, in some cases, causing the application to crash.

This flaw was first flagged by a contributor, Hazley Samsudin, whose prompt reporting allowed the Notepad++ team to act swiftly to resolve the issue.  As part of Notepad++'s ongoing <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27998">security</a> commitment, the Product Owner quickly released an official patch in version 8.9.4 to rectify the issue, ensuring the software remains secure for all users.
<h3 aria-level="2"><b><span data-contrast="none">The Impact of CVE-2026-3008 on Notepad++ Users</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
The vulnerability in Notepad++ version 8.9.3 has the potential for significant impacts on users. If successfully exploited, attackers could manipulate the string <a id="menurd8" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://thecyberexpress.com/command-injection-vulnerability-in-cisco-urwb/" href="https://thecyberexpress.com/command-injection-vulnerability-in-cisco-urwb/" target="_blank" rel="noreferrer noopener" aria-label="Link injection vulnerability">injection vulnerability</a> to access memory addresses or even crash the application entirely. This could compromise the integrity of unsaved <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27999">data</a> or disrupt workflow, particularly in environments where Notepad++ is a critical tool for coding or note-taking.

While this vulnerability may not allow for direct execution of arbitrary code, its potential for causing application crashes poses a <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risk" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28001">risk</a> to stability, especially if users are working with large or complex files. Given the widespread use of Notepad++ across multiple industries, it is crucial for users to take immediate action by upgrading to the secure 8.9.4 version.
<h3 aria-level="2"><b><span data-contrast="none">Affected Versions of Notepad++</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">The vulnerability (CVE-2026-3008) is present exclusively in Notepad++ version 8.9.3. Therefore, anyone using this version or earlier versions is at risk of <a href="https://thecyberexpress.com/forticlientems-flaws-under-active-exploitation/" target="_blank" rel="noopener">exploitation</a>. The update to version 8.9.4, which includes necessary security patches, should be prioritized to prevent any potential exploitation of this vulnerability.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Users of Notepad++ are strongly encouraged to update their installations to the latest version, 8.9.4, which has been designed to address the <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/"   title="vulnerabilities" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28002">vulnerabilities</a> identified, including CVE-2026-3008. The Notepad++ development team worked quickly to release this update, which also includes a series of bug fixes and performance improvements.</span>

<span data-contrast="auto">To ensure that systems remain secure, users can download the latest release directly from the official Notepad++ website or the <a href="https://thecyberexpress.com/researchers-exploit-github-actions-artifacts/" target="_blank" rel="noopener">GitHub repository</a>. Administrators managing multiple machines should push the update across their networks to guarantee all affected systems are secured.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">In addition to this update, Notepad++ version 8.9.4 includes several other improvements aimed at enhancing the software's overall stability and performance. These include fixes for crashes related to undo actions, improvements to file path handling, and updates to Scintilla and Lexilla for better language processing.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Notable Fixes in Notepad++ v8.9.4</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">The <a href="https://community.notepad-plus-plus.org/topic/27500/notepad-v8-9-4-release-candidate/3" target="_blank" rel="nofollow noopener">v8.9.4 update</a> not only resolves the CVE-2026-3008 vulnerability but also brings a host of other important bug fixes and stability improvements. Some of the notable changes include:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<ul>
 	<li><b><span data-contrast="auto">Fixes to Crashes</span></b><span data-contrast="auto">: Issues such as crashes when using the FindInFiles feature or when dropping files with long paths (over 259 characters) have been addressed. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><b><span data-contrast="auto">Undo Action Issues</span></b><span data-contrast="auto">: Previous versions had an issue with crashes caused by undoing actions in the column editor, especially when bad inputs were entered. This issue has now been resolved. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><b><span data-contrast="auto">UI and Rendering Fixes</span></b><span data-contrast="auto">: Improvements have been made to the user interface, including fixes for visual glitches in the Mark dialog and <a class="wpil_keyword_link" href="https://thecyberexpress.com/how-to-password-protect-a-word-document/"   title="Document" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28003">Document</a> List view. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><b><span data-contrast="auto">Improved Language Support</span></b><span data-contrast="auto">: Updates to Scintilla and Lexilla provide better handling of C++ 11 raw string literals and enhanced syntax highlighting for various file formats. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<span data-contrast="auto">Additionally, the update addresses installation issues that impacted users of the MSI installer, including problems with context menu registrations and incorrect hexadecimal display names during installation.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111698</post-id>	</item>
		<item>
		<title>Toronto Police Bust Mobile Smishing Network Targeting Thousands</title>
		<link>https://thecyberexpress.com/canada-sms-blaster-cybercrime-case/</link>
		
		<dc:creator><![CDATA[Samiksha Jain]]></dc:creator>
		<pubDate>Mon, 27 Apr 2026 12:20:24 +0000</pubDate>
				<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Canada SMS blaster cybercrime case]]></category>
		<category><![CDATA[SMS Blaster Cybercrime]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<category><![CDATA[Toronto Police]]></category>
		<category><![CDATA[Type of Cyber Threat in Canada]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111682</guid>

					<description><![CDATA[<p><img width="1376" height="768" src="https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Canada SMS blaster cybercrime case" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-1140x636.webp 1140w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-1140x636.webp 1140w" sizes="(max-width: 1376px) 100vw, 1376px" title="Toronto Police Bust Mobile Smishing Network Targeting Thousands 9"></p>A major Canada SMS blaster cybercrime case has come to light as Toronto Police charge three men with 44 offences in what authorities describe as a first-of-its-kind investigation in the country. The case, part of Project Lighthouse, highlights a growing threat where <a href="https://thecyberexpress.com/nation-state-hackers-weaponize-winrar-flaw/" target="_blank" rel="noopener">cybercriminals</a> use mobile technology to target thousands of people at once.

The investigation began in November 2025 after a security partner alerted police to a suspected SMS blaster operating in downtown Toronto. What followed was a months-long probe into a sophisticated operation that combined mobility, deception, and large-scale disruption.
<h3>What Is the Canada SMS Blaster Cybercrime Case?</h3>
At the center of the Canada SMS blaster <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/" target="_blank"  rel="noopener" title="cybercrime" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27996">cybercrime</a> case is a device that mimics a legitimate cellular tower. When nearby <a href="https://thecyberexpress.com/how-to-find-hidden-cameras-using-mobile-phones/" target="_blank" rel="noopener">mobile phones</a> connect to it, users receive fraudulent messages that appear to come from trusted organizations. These messages often include links to fake websites designed to steal sensitive information such as banking credentials and <a href="https://thecyberexpress.com/steps-to-create-unbreakable-passwords/" target="_blank" rel="noopener">passwords</a>.

This method is widely known as “<a href="https://thecyberexpress.com/smishing-and-vishing-in-2025/" target="_blank" rel="noopener">smishing</a>,” a form of phishing carried out through text messages. However, the scale and mobility of the device used in this case set it apart from typical <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyber" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27995">cyber</a> fraud schemes.

Deputy Chief Rob Johnson <a href="https://www.tps.ca/media-centre/stories/unprecedented-sms-blaster-arrests/" target="_blank" rel="nofollow noopener">said</a> the operation posed serious risks beyond financial fraud. He noted that the technology had the capability to reach thousands of devices simultaneously, raising concerns about public safety.
<h3>Large-Scale Disruption Across the Greater Toronto Area</h3>
Investigators found that the SMS blaster was not stationary. It was operated from vehicles, allowing suspects to move across the Greater Toronto Area and deploy the device in multiple locations.

According to Detective Sergeant Lindsay Riddell, tens of thousands of devices connected to the rogue network over several months. Police also recorded more than 13 million network disruptions, during which affected devices were unable to connect to legitimate cellular networks.

These disruptions had serious implications. During those moments, access to emergency services such as 9-1-1 could have been impacted, making the Canada SMS blaster cybercrime case not just a financial threat but also a public safety concern.
<h3>Arrests and Seizure of Devices</h3>
Toronto Police executed search warrants on March 31 at residences in Markham and Hamilton, leading to the arrest of two suspects. Authorities seized multiple SMS blasters along with a significant amount of electronic evidence.

A third individual later turned himself in on April 21. All three now face a combined total of 44 charges linked to the operation.

The Canada SMS blaster cybercrime case involved extensive coordination between multiple agencies, including the Royal Canadian Mounted Police National Cybercrime Coordination Centre, regional police services, financial institutions, and telecom providers. Officials say this collaboration was key to identifying and disrupting the activity.
<h3>A New Type of Cyber Threat in Canada</h3>
Law enforcement officials emphasized that this is the first known case of SMS blaster technology being used in Canada. The case reflects how cyber-enabled crimes are becoming more advanced and harder to detect.

Authorities noted that while the technology is new, the objective remains the same: to gain unauthorized access to personal and financial information. The Canada SMS blaster cybercrime case shows how attackers are combining traditional <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/fraud/" target="_blank"  rel="noopener" title="fraud" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27997">fraud</a> tactics with newer tools to scale their operations.
<h3>Public Advisory and Safety Measures</h3>
Police are urging the public to remain cautious when receiving unexpected text messages. Users are advised not to click on suspicious links or share personal information through unsolicited messages.

Officials recommend accessing banking services only through official applications or by directly entering website addresses into browsers. Victims of suspected fraud are encouraged to report incidents to law enforcement.

Deputy Chief Johnson also acknowledged the role of the Toronto Police Coordinated Cyber Centre and partner agencies in handling the investigation. He stressed that staying informed and vigilant remains one of the most effective defenses against such threats.]]></description>
										<content:encoded><![CDATA[<p><img width="1376" height="768" src="https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Canada SMS blaster cybercrime case" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-1140x636.webp 1140w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-1140x636.webp 1140w" sizes="(max-width: 1376px) 100vw, 1376px" title="Toronto Police Bust Mobile Smishing Network Targeting Thousands 10"></p>A major Canada SMS blaster cybercrime case has come to light as Toronto Police charge three men with 44 offences in what authorities describe as a first-of-its-kind investigation in the country. The case, part of Project Lighthouse, highlights a growing threat where <a href="https://thecyberexpress.com/nation-state-hackers-weaponize-winrar-flaw/" target="_blank" rel="noopener">cybercriminals</a> use mobile technology to target thousands of people at once.

The investigation began in November 2025 after a security partner alerted police to a suspected SMS blaster operating in downtown Toronto. What followed was a months-long probe into a sophisticated operation that combined mobility, deception, and large-scale disruption.
<h3>What Is the Canada SMS Blaster Cybercrime Case?</h3>
At the center of the Canada SMS blaster <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/" target="_blank"  rel="noopener" title="cybercrime" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27996">cybercrime</a> case is a device that mimics a legitimate cellular tower. When nearby <a href="https://thecyberexpress.com/how-to-find-hidden-cameras-using-mobile-phones/" target="_blank" rel="noopener">mobile phones</a> connect to it, users receive fraudulent messages that appear to come from trusted organizations. These messages often include links to fake websites designed to steal sensitive information such as banking credentials and <a href="https://thecyberexpress.com/steps-to-create-unbreakable-passwords/" target="_blank" rel="noopener">passwords</a>.

This method is widely known as “<a href="https://thecyberexpress.com/smishing-and-vishing-in-2025/" target="_blank" rel="noopener">smishing</a>,” a form of phishing carried out through text messages. However, the scale and mobility of the device used in this case set it apart from typical <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyber" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27995">cyber</a> fraud schemes.

Deputy Chief Rob Johnson <a href="https://www.tps.ca/media-centre/stories/unprecedented-sms-blaster-arrests/" target="_blank" rel="nofollow noopener">said</a> the operation posed serious risks beyond financial fraud. He noted that the technology had the capability to reach thousands of devices simultaneously, raising concerns about public safety.
<h3>Large-Scale Disruption Across the Greater Toronto Area</h3>
Investigators found that the SMS blaster was not stationary. It was operated from vehicles, allowing suspects to move across the Greater Toronto Area and deploy the device in multiple locations.

According to Detective Sergeant Lindsay Riddell, tens of thousands of devices connected to the rogue network over several months. Police also recorded more than 13 million network disruptions, during which affected devices were unable to connect to legitimate cellular networks.

These disruptions had serious implications. During those moments, access to emergency services such as 9-1-1 could have been impacted, making the Canada SMS blaster cybercrime case not just a financial threat but also a public safety concern.
<h3>Arrests and Seizure of Devices</h3>
Toronto Police executed search warrants on March 31 at residences in Markham and Hamilton, leading to the arrest of two suspects. Authorities seized multiple SMS blasters along with a significant amount of electronic evidence.

A third individual later turned himself in on April 21. All three now face a combined total of 44 charges linked to the operation.

The Canada SMS blaster cybercrime case involved extensive coordination between multiple agencies, including the Royal Canadian Mounted Police National Cybercrime Coordination Centre, regional police services, financial institutions, and telecom providers. Officials say this collaboration was key to identifying and disrupting the activity.
<h3>A New Type of Cyber Threat in Canada</h3>
Law enforcement officials emphasized that this is the first known case of SMS blaster technology being used in Canada. The case reflects how cyber-enabled crimes are becoming more advanced and harder to detect.

Authorities noted that while the technology is new, the objective remains the same: to gain unauthorized access to personal and financial information. The Canada SMS blaster cybercrime case shows how attackers are combining traditional <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/fraud/" target="_blank"  rel="noopener" title="fraud" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27997">fraud</a> tactics with newer tools to scale their operations.
<h3>Public Advisory and Safety Measures</h3>
Police are urging the public to remain cautious when receiving unexpected text messages. Users are advised not to click on suspicious links or share personal information through unsolicited messages.

Officials recommend accessing banking services only through official applications or by directly entering website addresses into browsers. Victims of suspected fraud are encouraged to report incidents to law enforcement.

Deputy Chief Johnson also acknowledged the role of the Toronto Police Coordinated Cyber Centre and partner agencies in handling the investigation. He stressed that staying informed and vigilant remains one of the most effective defenses against such threats.]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111682</post-id>	</item>
		<item>
		<title>Operation TrustTrap Reveals 16,800 Fake Domains Exploiting User Trust</title>
		<link>https://thecyberexpress.com/operation-trusttrap/</link>
		
		<dc:creator><![CDATA[Ashish Khaitan]]></dc:creator>
		<pubDate>Mon, 27 Apr 2026 11:06:14 +0000</pubDate>
				<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Dark Web News]]></category>
		<category><![CDATA[Alibaba Cloud]]></category>
		<category><![CDATA[Tencent Cloud]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111649</guid>

					<description><![CDATA[<p><img width="1101" height="614" src="https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Operation TrustTrap" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap.png 1101w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-300x167.png 300w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-1024x571.png 1024w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-768x428.png 768w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-600x335.png 600w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-150x84.png 150w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-750x418.png 750w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap.avif 1101w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-300x167.avif 300w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-1024x571.avif 1024w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-768x428.avif 768w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-600x335.avif 600w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-150x84.avif 150w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-750x418.avif 750w" sizes="(max-width: 1101px) 100vw, 1101px" title="Operation TrustTrap Reveals 16,800 Fake Domains Exploiting User Trust 11"></p><div class="text-base my-auto mx-auto [--thread-content-margin:var(--thread-content-margin-xs,calc(var(--spacing)*4))] @w-sm/main:[--thread-content-margin:var(--thread-content-margin-sm,calc(var(--spacing)*6))] @w-lg/main:[--thread-content-margin:var(--thread-content-margin-lg,calc(var(--spacing)*16))] px-(--thread-content-margin)">
<div class="[--thread-content-max-width:40rem] @w-lg/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn">
<div class="flex max-w-full flex-col gap-4 grow">
<div class="min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal outline-none keyboard-focused:focus-ring [.text-message+&amp;]:mt-1" dir="auto" data-message-author-role="assistant" data-message-id="fc12a00f-f0b4-4e9c-8696-1a1e7a9d93b7" data-message-model-slug="gpt-5-3-mini">
<div class="flex w-full flex-col gap-1 empty:hidden">
<div class="markdown prose dark:prose-invert w-full wrap-break-word light markdown-new-styling">
<p data-start="112" data-end="659">In a world where digital threats are becoming more confusing, Cyble Research and Intelligence Labs (CRIL) has uncovered one of the most extensive deceptive domain spoofing campaigns to date.</p>
<p data-start="112" data-end="659">Dubbed Operation TrustTrap, this large-scale operation has leveraged over 16,800 malicious domains to exploit cognitive trust mechanisms and harvest sensitive user data from unsuspecting victims.</p>
<p data-start="112" data-end="659">The scope and scale of this operation reveal a shift in how cybercriminals are evolving their tactics to bypass traditional technical security measures.</p>

<h3 data-start="112" data-end="659">What is Operation TrustTrap</h3>
<p data-start="701" data-end="1222">Since early 2026, <a href="https://cyble.com/blog/operation-trusttrap-domain-spoofing-campaign/" target="_blank" rel="nofollow noopener">CRIL</a> has been tracking a well-coordinated infrastructure involving a massive network of spoofed domains. These domains were designed to mimic legitimate government portals, particularly those related to transportation services like Department of Motor Vehicles (DMV) portals, toll payment systems, and vehicle registration services in the United States. The aim of this campaign is clear: credential and payment card harvesting through the exploitation of trusted government-facing services.</p>
<p data-start="1224" data-end="1608">However, the technical complexity of the attack isn't based on advanced <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-hacking/"   title="hacking" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27994">hacking</a> techniques. Instead, Operation TrustTrap exploits how humans visually interpret URLs. By embedding government-like subdomains, attackers have created fraudulent domains that resemble legitimate government addresses, deceiving individuals into visiting these sites and providing <a href="https://thecyberexpress.com/situsamc-data-breach/" target="_blank" rel="noopener">sensitive information</a>.</p>

<h3 data-section-id="1ybrbf0" data-start="1610" data-end="1673">Tencent Cloud and Alibaba Cloud APAC</h3>
<p data-start="1675" data-end="2001">The spoofed domains were predominantly hosted on Tencent Cloud and Alibaba Cloud APAC, both of which have significant <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27993">data</a> centers in the Asia-Pacific region. These platforms have been linked to the infrastructure of the campaign, and their concentrated use adds another layer of complexity to the attribution process.</p>
<p data-start="2003" data-end="2443">Furthermore, CRIL found that the domains were primarily registered through Gname.com Pte. Ltd., a registrar known for its significant Chinese customer base. Other registrars, such as Dominet (HK) Limited and NameSilo LLC, were also identified in the campaign.</p>
<p data-start="2003" data-end="2443">These domain names were often associated with .bond, .cc, and .cfd top-level domains (TLDs), which were frequently used to <a href="https://thecyberexpress.com/situsamc-data-breach/" target="_blank" rel="noopener">evade detection</a> and blacklisting.</p>

<h3 data-section-id="3cjjwp" data-start="2445" data-end="2493">The Key Technique: Subdomain Trust Injection</h3>
<p data-start="2495" data-end="2901">The most common method used in Operation TrustTrap is subdomain trust injection. This technique involves embedding trusted government tokens, such as mass.gov or wa.gov, in subdomains rather than the root domain. In legitimate URLs, the .gov component typically appears at the end of the domain string, but in these malicious domains, .gov is cleverly placed as part of a subdomain.</p>
<p data-start="2903" data-end="3321">For instance, a URL such as mass.gov-bzyc[.]cc will lead a user to believe they are accessing an official Massachusetts government page, but in reality, they are on a fraudulent site designed to capture personal and financial data.</p>


[caption id="" align="alignnone" width="1024"]<img src="https://cyble.com/wp-content/uploads/2026/04/figure5-1024x768.png" alt="Fake Massachusetts RMV citation landing page" width="1024" height="768" /> Fake Massachusetts RMV citation landing page (Source: Cyble)[/caption]
<p data-start="2903" data-end="3321">This manipulation of the domain’s structure is visually convincing, but it bypasses traditional <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27991">security</a> filters that only check the root domain for trusted indicators like .gov.</p>
<p data-start="3323" data-end="3565">Another obfuscation technique used is hyphen-based semantic manipulation, where hyphens are inserted into familiar government identifiers to create visually similar URLs. This tactic further complicates the detection of <a href="https://thecyberexpress.com/zero-day-patched-in-ios-18-6-2/" target="_blank" rel="noopener">malicious domains</a>.</p>

<h3 data-section-id="4y36vi" data-start="3567" data-end="3606">Global Targeting and Regional Focus</h3>
<p data-start="3608" data-end="3942">While Operation TrustTrap is heavily focused on the United States, targeting state portals such as those in California, Washington, and Florida, the operation is not confined to one region. CRIL identified similar spoofing efforts targeting government portals in India, Vietnam, and the United Kingdom.</p>
<p data-start="3944" data-end="4418">In India, attackers have specifically targeted portals that follow the .gov.in domain structure. By injecting subdomains like <a class="decorated-link cursor-pointer" target="_new" rel="noopener" data-start="4076" data-end="4091">www.in.gov-bond</a>, the attackers were able to replicate the appearance of legitimate government websites, particularly those related to the Indian Department of National Investigation (NIA) and other defense-adjacent sites.</p>

[caption id="" align="alignnone" width="939"]<img src="https://cyble.com/wp-content/uploads/2026/04/figure7.png" alt="APT36 impersonating NIA, India operating at nia[.]gov[.]in[.]in3ymonaq[.]casa" width="939" height="703" /> APT36 impersonating NIA (Source: Cyble)[/caption]
<p data-start="3944" data-end="4418">This specific targeting suggests that the <a class="wpil_keyword_link" href="https://cyble.com/threat-actor/" target="_blank"  rel="noopener" title="threat actor" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27992">threat actor</a> has knowledge of government infrastructure and how it operates.</p>

<h3 data-section-id="1vpy0of" data-start="4420" data-end="4471">APT36 and the Connection to Operation TrustTrap</h3>
<p data-start="4473" data-end="4862">In addition to the use of Tencent Cloud and Alibaba Cloud, the tactics, techniques, and procedures (TTPs) observed in the campaign bear a striking resemblance to those used by <a href="https://cyble.com/threat-actor-profiles/transparenttribe/" target="_blank" rel="nofollow noopener">APT36 (also known as Transparent Tribe)</a>. This Pakistan-based Advanced Persistent Threat (APT) group has a long history of targeting Indian government entities, defense personnel, and diplomatic infrastructure.</p>
<p data-start="4864" data-end="5226">The infrastructure used in Operation TrustTrap shows similarities to APT36’s previous campaigns, particularly in terms of the domain registration patterns and use of Tencent Cloud and Alibaba Cloud APAC infrastructure. Furthermore, the behavior observed, including domain rotation and the use of disposable domains, matches previous APT36 activities.</p>

<h3 data-section-id="11in17k" data-start="5228" data-end="5262">Registrar and Hosting Analysis</h3>
<p data-start="5264" data-end="5615">The dominance of Gname.com as the registrar of choice for over 70% of the spoofed domains points to a specific trend in the campaign’s operational setup. This Singapore-based registrar, which serves a large number of Chinese entities, is part of the broader infrastructure strategy that focuses on low-cost hosting in the Asia-Pacific region.</p>
<p data-start="5617" data-end="5990">Notably, Tencent Cloud and Alibaba Cloud APAC offer cloud services with global reach, providing the necessary infrastructure to scale this type of malicious operation. These services have been instrumental in supporting the rapid deployment of <a href="https://thecyberexpress.com/btmob-rat/" target="_blank" rel="noopener">phishing sites</a> across a variety of government services, especially those involving time-sensitive financial transactions.</p>

</div>
</div>
</div>
</div>
</div>
</div>]]></description>
										<content:encoded><![CDATA[<p><img width="1101" height="614" src="https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Operation TrustTrap" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap.png 1101w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-300x167.png 300w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-1024x571.png 1024w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-768x428.png 768w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-600x335.png 600w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-150x84.png 150w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-750x418.png 750w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap.avif 1101w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-300x167.avif 300w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-1024x571.avif 1024w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-768x428.avif 768w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-600x335.avif 600w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-150x84.avif 150w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-750x418.avif 750w" sizes="(max-width: 1101px) 100vw, 1101px" title="Operation TrustTrap Reveals 16,800 Fake Domains Exploiting User Trust 14"></p><div class="text-base my-auto mx-auto [--thread-content-margin:var(--thread-content-margin-xs,calc(var(--spacing)*4))] @w-sm/main:[--thread-content-margin:var(--thread-content-margin-sm,calc(var(--spacing)*6))] @w-lg/main:[--thread-content-margin:var(--thread-content-margin-lg,calc(var(--spacing)*16))] px-(--thread-content-margin)">
<div class="[--thread-content-max-width:40rem] @w-lg/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn">
<div class="flex max-w-full flex-col gap-4 grow">
<div class="min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal outline-none keyboard-focused:focus-ring [.text-message+&amp;]:mt-1" dir="auto" data-message-author-role="assistant" data-message-id="fc12a00f-f0b4-4e9c-8696-1a1e7a9d93b7" data-message-model-slug="gpt-5-3-mini">
<div class="flex w-full flex-col gap-1 empty:hidden">
<div class="markdown prose dark:prose-invert w-full wrap-break-word light markdown-new-styling">
<p data-start="112" data-end="659">In a world where digital threats are becoming more confusing, Cyble Research and Intelligence Labs (CRIL) has uncovered one of the most extensive deceptive domain spoofing campaigns to date.</p>
<p data-start="112" data-end="659">Dubbed Operation TrustTrap, this large-scale operation has leveraged over 16,800 malicious domains to exploit cognitive trust mechanisms and harvest sensitive user data from unsuspecting victims.</p>
<p data-start="112" data-end="659">The scope and scale of this operation reveal a shift in how cybercriminals are evolving their tactics to bypass traditional technical security measures.</p>

<h3 data-start="112" data-end="659">What is Operation TrustTrap</h3>
<p data-start="701" data-end="1222">Since early 2026, <a href="https://cyble.com/blog/operation-trusttrap-domain-spoofing-campaign/" target="_blank" rel="nofollow noopener">CRIL</a> has been tracking a well-coordinated infrastructure involving a massive network of spoofed domains. These domains were designed to mimic legitimate government portals, particularly those related to transportation services like Department of Motor Vehicles (DMV) portals, toll payment systems, and vehicle registration services in the United States. The aim of this campaign is clear: credential and payment card harvesting through the exploitation of trusted government-facing services.</p>
<p data-start="1224" data-end="1608">However, the technical complexity of the attack isn't based on advanced <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-hacking/"   title="hacking" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27994">hacking</a> techniques. Instead, Operation TrustTrap exploits how humans visually interpret URLs. By embedding government-like subdomains, attackers have created fraudulent domains that resemble legitimate government addresses, deceiving individuals into visiting these sites and providing <a href="https://thecyberexpress.com/situsamc-data-breach/" target="_blank" rel="noopener">sensitive information</a>.</p>

<h3 data-section-id="1ybrbf0" data-start="1610" data-end="1673">Tencent Cloud and Alibaba Cloud APAC</h3>
<p data-start="1675" data-end="2001">The spoofed domains were predominantly hosted on Tencent Cloud and Alibaba Cloud APAC, both of which have significant <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27993">data</a> centers in the Asia-Pacific region. These platforms have been linked to the infrastructure of the campaign, and their concentrated use adds another layer of complexity to the attribution process.</p>
<p data-start="2003" data-end="2443">Furthermore, CRIL found that the domains were primarily registered through Gname.com Pte. Ltd., a registrar known for its significant Chinese customer base. Other registrars, such as Dominet (HK) Limited and NameSilo LLC, were also identified in the campaign.</p>
<p data-start="2003" data-end="2443">These domain names were often associated with .bond, .cc, and .cfd top-level domains (TLDs), which were frequently used to <a href="https://thecyberexpress.com/situsamc-data-breach/" target="_blank" rel="noopener">evade detection</a> and blacklisting.</p>

<h3 data-section-id="3cjjwp" data-start="2445" data-end="2493">The Key Technique: Subdomain Trust Injection</h3>
<p data-start="2495" data-end="2901">The most common method used in Operation TrustTrap is subdomain trust injection. This technique involves embedding trusted government tokens, such as mass.gov or wa.gov, in subdomains rather than the root domain. In legitimate URLs, the .gov component typically appears at the end of the domain string, but in these malicious domains, .gov is cleverly placed as part of a subdomain.</p>
<p data-start="2903" data-end="3321">For instance, a URL such as mass.gov-bzyc[.]cc will lead a user to believe they are accessing an official Massachusetts government page, but in reality, they are on a fraudulent site designed to capture personal and financial data.</p>


[caption id="" align="alignnone" width="1024"]<img src="https://cyble.com/wp-content/uploads/2026/04/figure5-1024x768.png" alt="Fake Massachusetts RMV citation landing page" width="1024" height="768" /> Fake Massachusetts RMV citation landing page (Source: Cyble)[/caption]
<p data-start="2903" data-end="3321">This manipulation of the domain’s structure is visually convincing, but it bypasses traditional <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27991">security</a> filters that only check the root domain for trusted indicators like .gov.</p>
<p data-start="3323" data-end="3565">Another obfuscation technique used is hyphen-based semantic manipulation, where hyphens are inserted into familiar government identifiers to create visually similar URLs. This tactic further complicates the detection of <a href="https://thecyberexpress.com/zero-day-patched-in-ios-18-6-2/" target="_blank" rel="noopener">malicious domains</a>.</p>

<h3 data-section-id="4y36vi" data-start="3567" data-end="3606">Global Targeting and Regional Focus</h3>
<p data-start="3608" data-end="3942">While Operation TrustTrap is heavily focused on the United States, targeting state portals such as those in California, Washington, and Florida, the operation is not confined to one region. CRIL identified similar spoofing efforts targeting government portals in India, Vietnam, and the United Kingdom.</p>
<p data-start="3944" data-end="4418">In India, attackers have specifically targeted portals that follow the .gov.in domain structure. By injecting subdomains like <a class="decorated-link cursor-pointer" target="_new" rel="noopener" data-start="4076" data-end="4091">www.in.gov-bond</a>, the attackers were able to replicate the appearance of legitimate government websites, particularly those related to the Indian Department of National Investigation (NIA) and other defense-adjacent sites.</p>

[caption id="" align="alignnone" width="939"]<img src="https://cyble.com/wp-content/uploads/2026/04/figure7.png" alt="APT36 impersonating NIA, India operating at nia[.]gov[.]in[.]in3ymonaq[.]casa" width="939" height="703" /> APT36 impersonating NIA (Source: Cyble)[/caption]
<p data-start="3944" data-end="4418">This specific targeting suggests that the <a class="wpil_keyword_link" href="https://cyble.com/threat-actor/" target="_blank"  rel="noopener" title="threat actor" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27992">threat actor</a> has knowledge of government infrastructure and how it operates.</p>

<h3 data-section-id="1vpy0of" data-start="4420" data-end="4471">APT36 and the Connection to Operation TrustTrap</h3>
<p data-start="4473" data-end="4862">In addition to the use of Tencent Cloud and Alibaba Cloud, the tactics, techniques, and procedures (TTPs) observed in the campaign bear a striking resemblance to those used by <a href="https://cyble.com/threat-actor-profiles/transparenttribe/" target="_blank" rel="nofollow noopener">APT36 (also known as Transparent Tribe)</a>. This Pakistan-based Advanced Persistent Threat (APT) group has a long history of targeting Indian government entities, defense personnel, and diplomatic infrastructure.</p>
<p data-start="4864" data-end="5226">The infrastructure used in Operation TrustTrap shows similarities to APT36’s previous campaigns, particularly in terms of the domain registration patterns and use of Tencent Cloud and Alibaba Cloud APAC infrastructure. Furthermore, the behavior observed, including domain rotation and the use of disposable domains, matches previous APT36 activities.</p>

<h3 data-section-id="11in17k" data-start="5228" data-end="5262">Registrar and Hosting Analysis</h3>
<p data-start="5264" data-end="5615">The dominance of Gname.com as the registrar of choice for over 70% of the spoofed domains points to a specific trend in the campaign’s operational setup. This Singapore-based registrar, which serves a large number of Chinese entities, is part of the broader infrastructure strategy that focuses on low-cost hosting in the Asia-Pacific region.</p>
<p data-start="5617" data-end="5990">Notably, Tencent Cloud and Alibaba Cloud APAC offer cloud services with global reach, providing the necessary infrastructure to scale this type of malicious operation. These services have been instrumental in supporting the rapid deployment of <a href="https://thecyberexpress.com/btmob-rat/" target="_blank" rel="noopener">phishing sites</a> across a variety of government services, especially those involving time-sensitive financial transactions.</p>

</div>
</div>
</div>
</div>
</div>
</div>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111649</post-id>	</item>
		<item>
		<title>Litecoin Hit by Zero-Day Vulnerability, Triggers 13-Block Reorganization</title>
		<link>https://thecyberexpress.com/litecoin-network-zero-day-bug/</link>
		
		<dc:creator><![CDATA[Ashish Khaitan]]></dc:creator>
		<pubDate>Mon, 27 Apr 2026 11:01:55 +0000</pubDate>
				<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[Vulnerability News]]></category>
		<category><![CDATA[DoS]]></category>
		<category><![CDATA[Litecoin Network]]></category>
		<category><![CDATA[MWEB]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Zero Day]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111672</guid>

					<description><![CDATA[<p><img width="1101" height="614" src="https://thecyberexpress.com/wp-content/uploads/Litecoin-Network.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Litecoin Network" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Litecoin-Network.webp 1101w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-750x418.webp 750w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network.webp 1101w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-750x418.webp 750w" sizes="(max-width: 1101px) 100vw, 1101px" title="Litecoin Hit by Zero-Day Vulnerability, Triggers 13-Block Reorganization 15"></p><span data-contrast="auto">The Litecoin network faced a security breach when a zero-day vulnerability triggered a 13-block reorganization, impacting several major mining pools. This disruption led to a temporary halt in transaction finality, drawing attention to the potential risks within the Litecoin ecosystem. </span>

<span data-contrast="auto">The Litecoin team quickly confirmed the bug on their official X account and assured the community that a patch had been fully deployed to resolve the issue.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:279}"> </span>
<h3 aria-level="3"><b><span data-contrast="none">The Zero-Day Bug and Its Impact on the Litecoin Network</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}"> </span></h3>
<span data-contrast="auto">A zero-day <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/vulnerabilities/"   title="vulnerability" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27990">vulnerability</a> refers to a flaw that is unknown to the developers at the time of its exploitation. In this case, the bug targeted the handling of MimbleWimble Extension Block (MWEB) transactions, a <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-privacy/"   title="privacy" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27986">privacy</a> feature on the Litecoin network. The vulnerability allowed an attacker to exploit the network by triggering a <a href="https://thecyberexpress.com/ebay-outage-april-2026-ddos-attack/" target="_blank" rel="noopener">Denial-of-Service (DoS) attack</a>, flooding the network with invalid MWEB transactions.</span>

<span data-contrast="auto">MWEB transactions are designed to offer enhanced privacy for Litecoin users by obscuring transaction details. However, due to the zero-day bug, some Litecoin nodes that had not updated their software accepted invalid MWEB transactions, violating the network’s consensus rules.</span>

<span data-contrast="auto">As a result, a block reorganization (or “reorg”) took place when a competing chain of blocks replaced the existing chain, causing 13 blocks to be reorganized. A block reorg of this magnitude is a rare event and presents significant challenges, including the potential for double-spending and undermined user confidence.</span>
<h3 aria-level="3"><b><span data-contrast="none">Understanding the Denial-of-Service Attack and Its Impact on Miners</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}"> </span></h3>
<span data-contrast="auto">The </span><a href="https://www.mexc.co/en-IN/news/1055251" target="_blank" rel="nofollow noopener"><span data-contrast="none">core target of the attack was the mining pools</span></a><span data-contrast="auto">, which play a critical role in securing the Litecoin network. Mining pools are groups of miners who pool their computational power to increase their chances of successfully finding a block. By launching a DoS attack, the attacker aimed to disrupt the mining process by overwhelming the network with invalid transactions.</span>

<span data-contrast="auto">The impact on miners was particularly severe. Mining pools that failed to update their nodes were unable to process valid blocks during the attack. This resulted in temporary downtime for these pools, contributing to a short-term drop in the network’s hashrate. While the Litecoin network quickly recovered, the event highlighted the vulnerability of <a href="https://thecyberexpress.com/miningdropper-android-malware/" target="_blank" rel="noopener">mining</a> operations when software updates are delayed or ignored.</span>
<h3 aria-level="3"><b><span data-contrast="none">Quick Response and Deployment of the Patch</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}"> </span></h3>
<span data-contrast="auto">Despite the severity of the incident, the Litecoin team responded promptly. Within hours, the development team confirmed the bug and rolled out a patch that effectively closed the attack vector. The patch prevented nodes from accepting invalid MWEB transactions, thus <a href="https://thecyberexpress.com/poland-cyberattack-energy-grid-blackout/" target="_blank" rel="noopener">stabilizing the network</a> and mitigating further risks. The team urged all node operators to update their software immediately to ensure the <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27988">security</a> of their operations.</span>

<span data-contrast="auto">Importantly, the Litecoin team confirmed that no funds were lost as a result of the reorganization. While users’ transactions that were part of the reorganized blocks were reversed, the overall integrity of the network remained intact. The incident, although disruptive, demonstrated the resilience and quick action of the Litecoin team.</span>
<h3 aria-level="3"><b><span data-contrast="none">The Role of MWEB and Zero-Day Bugs</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}"> </span></h3>
<span data-contrast="auto">Launched in 2011, Litecoin has earned a reputation as one of the oldest and most stable <a href="https://thecyberexpress.com/hitbtc-exchange-critical-security-warning/" target="_blank" rel="noopener">cryptocurrencies</a>. As a fork of Bitcoin, it relies on a proof-of-work consensus mechanism to validate transactions. Over the years, Litecoin has faced relatively few security incidents, but the April 25 event serves as a stark reminder that even established networks are susceptible to <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/"   title="vulnerabilities" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27987">vulnerabilities</a>.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The introduction of MWEB in 2022 marked a significant upgrade for Litecoin, providing users with enhanced privacy features. However, as seen with this recent zero-day vulnerability, new features can also introduce unforeseen <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risks" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27989">risks</a>. </span>]]></description>
										<content:encoded><![CDATA[<p><img width="1101" height="614" src="https://thecyberexpress.com/wp-content/uploads/Litecoin-Network.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Litecoin Network" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Litecoin-Network.webp 1101w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-750x418.webp 750w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network.webp 1101w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-750x418.webp 750w" sizes="(max-width: 1101px) 100vw, 1101px" title="Litecoin Hit by Zero-Day Vulnerability, Triggers 13-Block Reorganization 16"></p><span data-contrast="auto">The Litecoin network faced a security breach when a zero-day vulnerability triggered a 13-block reorganization, impacting several major mining pools. This disruption led to a temporary halt in transaction finality, drawing attention to the potential risks within the Litecoin ecosystem. </span>

<span data-contrast="auto">The Litecoin team quickly confirmed the bug on their official X account and assured the community that a patch had been fully deployed to resolve the issue.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:279}"> </span>
<h3 aria-level="3"><b><span data-contrast="none">The Zero-Day Bug and Its Impact on the Litecoin Network</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}"> </span></h3>
<span data-contrast="auto">A zero-day <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/vulnerabilities/"   title="vulnerability" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27990">vulnerability</a> refers to a flaw that is unknown to the developers at the time of its exploitation. In this case, the bug targeted the handling of MimbleWimble Extension Block (MWEB) transactions, a <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-privacy/"   title="privacy" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27986">privacy</a> feature on the Litecoin network. The vulnerability allowed an attacker to exploit the network by triggering a <a href="https://thecyberexpress.com/ebay-outage-april-2026-ddos-attack/" target="_blank" rel="noopener">Denial-of-Service (DoS) attack</a>, flooding the network with invalid MWEB transactions.</span>

<span data-contrast="auto">MWEB transactions are designed to offer enhanced privacy for Litecoin users by obscuring transaction details. However, due to the zero-day bug, some Litecoin nodes that had not updated their software accepted invalid MWEB transactions, violating the network’s consensus rules.</span>

<span data-contrast="auto">As a result, a block reorganization (or “reorg”) took place when a competing chain of blocks replaced the existing chain, causing 13 blocks to be reorganized. A block reorg of this magnitude is a rare event and presents significant challenges, including the potential for double-spending and undermined user confidence.</span>
<h3 aria-level="3"><b><span data-contrast="none">Understanding the Denial-of-Service Attack and Its Impact on Miners</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}"> </span></h3>
<span data-contrast="auto">The </span><a href="https://www.mexc.co/en-IN/news/1055251" target="_blank" rel="nofollow noopener"><span data-contrast="none">core target of the attack was the mining pools</span></a><span data-contrast="auto">, which play a critical role in securing the Litecoin network. Mining pools are groups of miners who pool their computational power to increase their chances of successfully finding a block. By launching a DoS attack, the attacker aimed to disrupt the mining process by overwhelming the network with invalid transactions.</span>

<span data-contrast="auto">The impact on miners was particularly severe. Mining pools that failed to update their nodes were unable to process valid blocks during the attack. This resulted in temporary downtime for these pools, contributing to a short-term drop in the network’s hashrate. While the Litecoin network quickly recovered, the event highlighted the vulnerability of <a href="https://thecyberexpress.com/miningdropper-android-malware/" target="_blank" rel="noopener">mining</a> operations when software updates are delayed or ignored.</span>
<h3 aria-level="3"><b><span data-contrast="none">Quick Response and Deployment of the Patch</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}"> </span></h3>
<span data-contrast="auto">Despite the severity of the incident, the Litecoin team responded promptly. Within hours, the development team confirmed the bug and rolled out a patch that effectively closed the attack vector. The patch prevented nodes from accepting invalid MWEB transactions, thus <a href="https://thecyberexpress.com/poland-cyberattack-energy-grid-blackout/" target="_blank" rel="noopener">stabilizing the network</a> and mitigating further risks. The team urged all node operators to update their software immediately to ensure the <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27988">security</a> of their operations.</span>

<span data-contrast="auto">Importantly, the Litecoin team confirmed that no funds were lost as a result of the reorganization. While users’ transactions that were part of the reorganized blocks were reversed, the overall integrity of the network remained intact. The incident, although disruptive, demonstrated the resilience and quick action of the Litecoin team.</span>
<h3 aria-level="3"><b><span data-contrast="none">The Role of MWEB and Zero-Day Bugs</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}"> </span></h3>
<span data-contrast="auto">Launched in 2011, Litecoin has earned a reputation as one of the oldest and most stable <a href="https://thecyberexpress.com/hitbtc-exchange-critical-security-warning/" target="_blank" rel="noopener">cryptocurrencies</a>. As a fork of Bitcoin, it relies on a proof-of-work consensus mechanism to validate transactions. Over the years, Litecoin has faced relatively few security incidents, but the April 25 event serves as a stark reminder that even established networks are susceptible to <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/"   title="vulnerabilities" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27987">vulnerabilities</a>.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The introduction of MWEB in 2022 marked a significant upgrade for Litecoin, providing users with enhanced privacy features. However, as seen with this recent zero-day vulnerability, new features can also introduce unforeseen <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risks" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27989">risks</a>. </span>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111672</post-id>	</item>
		<item>
		<title>eBay Struggles with Widespread Outage, Disrupting Transactions and API Access</title>
		<link>https://thecyberexpress.com/ebay-outage-april-2026-ddos-attack/</link>
		
		<dc:creator><![CDATA[Ashish Khaitan]]></dc:creator>
		<pubDate>Mon, 27 Apr 2026 10:04:00 +0000</pubDate>
				<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[DDoS Attacks News]]></category>
		<category><![CDATA[Threat Actors]]></category>
		<category><![CDATA[313 Team]]></category>
		<category><![CDATA[API]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[eBay Outage]]></category>
		<category><![CDATA[hacktivist group]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111661</guid>

					<description><![CDATA[<p><img width="1217" height="720" src="https://thecyberexpress.com/wp-content/uploads/eBay-Outage.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="eBay Outage" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/eBay-Outage.webp 1217w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-300x177.webp 300w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-1024x606.webp 1024w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-768x454.webp 768w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-600x355.webp 600w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-150x89.webp 150w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-750x444.webp 750w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-1140x674.webp 1140w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage.webp 1217w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-300x177.webp 300w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-1024x606.webp 1024w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-768x454.webp 768w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-600x355.webp 600w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-150x89.webp 150w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-750x444.webp 750w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-1140x674.webp 1140w" sizes="(max-width: 1217px) 100vw, 1217px" title="eBay Struggles with Widespread Outage, Disrupting Transactions and API Access 17"></p><span data-contrast="auto">The e-commerce platform eBay, a giant in online auctions and fixed-price listings, faced widespread disruptions beginning late Sunday, April 26, 2026, extending into Monday, as users across the globe reported severe technical issues. The eBay outage, which has crippled essential features of the site, particularly the API, has left many buyers and sellers frustrated, struggling to access critical functions, including search features, listings, and checkout processes.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">As users faced slow page loads, failed transactions, and difficulty completing sales, a series of unverified reports surfaced suggesting that the hacktivist group 313 Team was behind the massive denial-of-service (<a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-ddos-attack/" target="_blank"  rel="noopener" title="DDoS" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27984">DDoS</a>) attack, claiming responsibility for the outage. While the true cause remains unconfirmed by eBay, the timing and scale of the disruption have fueled speculation that a <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyberattack" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27985">cyberattack</a> was involved.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">The Scope of the eBay Outage</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">The eBay outage first began to affect eBay users on the afternoon of April 26, when they began reporting issues with the platform’s functionality. According to <a href="https://downdetector.com/status/ebay/" target="_blank" rel="nofollow noopener">Downdetector</a>, a popular service that tracks online outages, the spike in complaints reached around 3:30 PM ET, with the situation worsening the evening. As of 10:30 PM ET, more than 1,300 outage reports were logged, although the number eventually decreased to about 600 by 11:50 PM ET.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Users complained that essential functions like search were malfunctioning, and pages were loading extremely slowly. "I can't even search for anything or complete a purchase," one frustrated user posted on social media. Others echoed similar concerns, noting that critical transactions were unable to be completed, with error messages preventing them from checking out.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Sellers also voiced their frustrations, noting that they could not access the API, which is crucial for the functioning of third-party tools used to manage listings, inventory, and sales. "It’s been nearly 6 hours since the API went down, and we have no word from support," one seller wrote, emphasizing the financial impact of the outage.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Social Media Users Complain About the Outage</span></b></h3>
<span data-contrast="auto">While eBay has not officially confirmed the cause of the outage, rumors quickly began circulating on <a href="https://thecyberexpress.com/australia-social-media-ban-faces-question/" target="_blank" rel="noopener">social media</a> that the hacktivist group 313 Team was responsible for a DDoS attack targeting the platform. DDoS attacks, which flood a website with traffic to overwhelm its servers and take it offline, have become a frequent tactic for hacktivist groups in recent years.</span>

<span data-contrast="auto">The group, which has previously targeted high-profile organizations, allegedly posted a claim on various forums, taking credit for the disruption. However, this attribution has not been independently verified, and eBay has not provided details about the nature of the attack. The company’s official status page displayed no alerts of a cyberattack, showing only minor updates on the system’s functionality.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Despite these official updates, the community’s response has been vocal, with many users continuing to report issues well into the night. One individual posted, "It’s not just down for me, it’s down for everyone. Is this part of a bigger attack targeting e-commerce sites?"</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">With eBay’s customer support channels largely silent or offering only generic responses, users took to social media to express their frustration. The company’s Instagram account, where many users had previously reached out for help, quickly became a forum for complaints. One commenter wrote, “Brooo you’re down—come on, get up! I need to pay for an auction.” Others left similar messages, questioning the reliability of the platform and demanding answers.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>]]></description>
										<content:encoded><![CDATA[<p><img width="1217" height="720" src="https://thecyberexpress.com/wp-content/uploads/eBay-Outage.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="eBay Outage" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/eBay-Outage.webp 1217w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-300x177.webp 300w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-1024x606.webp 1024w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-768x454.webp 768w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-600x355.webp 600w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-150x89.webp 150w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-750x444.webp 750w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-1140x674.webp 1140w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage.webp 1217w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-300x177.webp 300w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-1024x606.webp 1024w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-768x454.webp 768w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-600x355.webp 600w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-150x89.webp 150w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-750x444.webp 750w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-1140x674.webp 1140w" sizes="(max-width: 1217px) 100vw, 1217px" title="eBay Struggles with Widespread Outage, Disrupting Transactions and API Access 18"></p><span data-contrast="auto">The e-commerce platform eBay, a giant in online auctions and fixed-price listings, faced widespread disruptions beginning late Sunday, April 26, 2026, extending into Monday, as users across the globe reported severe technical issues. The eBay outage, which has crippled essential features of the site, particularly the API, has left many buyers and sellers frustrated, struggling to access critical functions, including search features, listings, and checkout processes.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">As users faced slow page loads, failed transactions, and difficulty completing sales, a series of unverified reports surfaced suggesting that the hacktivist group 313 Team was behind the massive denial-of-service (<a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-ddos-attack/" target="_blank"  rel="noopener" title="DDoS" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27984">DDoS</a>) attack, claiming responsibility for the outage. While the true cause remains unconfirmed by eBay, the timing and scale of the disruption have fueled speculation that a <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyberattack" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27985">cyberattack</a> was involved.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">The Scope of the eBay Outage</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">The eBay outage first began to affect eBay users on the afternoon of April 26, when they began reporting issues with the platform’s functionality. According to <a href="https://downdetector.com/status/ebay/" target="_blank" rel="nofollow noopener">Downdetector</a>, a popular service that tracks online outages, the spike in complaints reached around 3:30 PM ET, with the situation worsening the evening. As of 10:30 PM ET, more than 1,300 outage reports were logged, although the number eventually decreased to about 600 by 11:50 PM ET.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Users complained that essential functions like search were malfunctioning, and pages were loading extremely slowly. "I can't even search for anything or complete a purchase," one frustrated user posted on social media. Others echoed similar concerns, noting that critical transactions were unable to be completed, with error messages preventing them from checking out.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Sellers also voiced their frustrations, noting that they could not access the API, which is crucial for the functioning of third-party tools used to manage listings, inventory, and sales. "It’s been nearly 6 hours since the API went down, and we have no word from support," one seller wrote, emphasizing the financial impact of the outage.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Social Media Users Complain About the Outage</span></b></h3>
<span data-contrast="auto">While eBay has not officially confirmed the cause of the outage, rumors quickly began circulating on <a href="https://thecyberexpress.com/australia-social-media-ban-faces-question/" target="_blank" rel="noopener">social media</a> that the hacktivist group 313 Team was responsible for a DDoS attack targeting the platform. DDoS attacks, which flood a website with traffic to overwhelm its servers and take it offline, have become a frequent tactic for hacktivist groups in recent years.</span>

<span data-contrast="auto">The group, which has previously targeted high-profile organizations, allegedly posted a claim on various forums, taking credit for the disruption. However, this attribution has not been independently verified, and eBay has not provided details about the nature of the attack. The company’s official status page displayed no alerts of a cyberattack, showing only minor updates on the system’s functionality.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Despite these official updates, the community’s response has been vocal, with many users continuing to report issues well into the night. One individual posted, "It’s not just down for me, it’s down for everyone. Is this part of a bigger attack targeting e-commerce sites?"</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">With eBay’s customer support channels largely silent or offering only generic responses, users took to social media to express their frustration. The company’s Instagram account, where many users had previously reached out for help, quickly became a forum for complaints. One commenter wrote, “Brooo you’re down—come on, get up! I need to pay for an auction.” Others left similar messages, questioning the reliability of the platform and demanding answers.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111661</post-id>	</item>
		<item>
		<title>Norway to Introduce Social Media Age Limit of 16, Platforms to Enforce Verification</title>
		<link>https://thecyberexpress.com/norway-social-media-age-limit-bill-moves-ahead/</link>
		
		<dc:creator><![CDATA[Samiksha Jain]]></dc:creator>
		<pubDate>Mon, 27 Apr 2026 10:02:13 +0000</pubDate>
				<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Policy Updates]]></category>
		<category><![CDATA[children’s mental health]]></category>
		<category><![CDATA[Norway]]></category>
		<category><![CDATA[Norway social media age limit]]></category>
		<category><![CDATA[Prime Minister Jonas Gahr Støre]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111659</guid>

					<description><![CDATA[<p><img width="1376" height="768" src="https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Norway social media age limit" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-1140x636.webp 1140w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-1140x636.webp 1140w" sizes="(max-width: 1376px) 100vw, 1376px" title="Norway to Introduce Social Media Age Limit of 16, Platforms to Enforce Verification 19"></p>The Norway social media age limit is moving closer to becoming law, with the government confirming it will introduce legislation this year to restrict access for children under 16. The proposal, expected to be presented to Parliament (Stortinget), aims to reshape how young users interact with digital platforms and place greater responsibility on technology companies for enforcing age restrictions.

Prime Minister Jonas Gahr Støre said the move is designed to protect childhood experiences from being dominated by screens and algorithms.

He emphasized that children should have space for play, friendships, and offline development, positioning the Norway social media age limit as a safeguard rather than a restriction.
<h3><strong>How the Norway Social Media Age Limit Will Work</strong></h3>
Under the proposed law, the Norway social media age limit will apply from January 1 of the year a child turns 16. This means access will be granted based on birth year rather than exact birthdate, ensuring that entire school cohorts are treated equally. In practice, most children will be at least 15 years old when they gain access.

Minister for Children and Families Lene Vågslid explained that this approach addresses concerns raised during public consultations. Many respondents argued that differences based on birthdates could create social divides among peers. By aligning access with school cohorts, the government aims to balance protection with inclusion.

“For me, it is important both to give better protection for children in the digital world and to listen to what young people are saying. I understand that social media can be an important social arena. We want to ensure inclusion and a sense of community. That is why we are proposing that the cutoff be based on the year of birth rather than the exact birth date, so that cohorts are given equal opportunities, regardless of when each person is born,” <a href="https://www.regjeringen.no/en/whats-new/norwegian-social-media-age-restrictions-law-on-track-to-be-introduced-this-year-this-is-how-the-age-limit-for-social-media-will-work/id3157276/" target="_blank" rel="nofollow noopener">said</a> Minister for Children and Families Lene Vågslid (Labour).

At the same time, officials acknowledge that social media plays a role in young people’s social lives. The policy attempts to maintain that balance while reducing early exposure to potential harms linked to excessive screen time and online interactions.
<h3><strong>Tech Companies to Enforce the Norway Social Media Age Limit</strong></h3>
A key feature of the Norway social media age limit is the shift in responsibility to technology companies. Platforms will be required to implement effective age verification systems at login, ensuring that underage users cannot bypass restrictions.

Minister of Digitalisation and Public Governance Karianne Tung made it clear that enforcement will not rely on children or parents alone. She stated that companies must take full responsibility for compliance and ensure that safeguards are operational from the first day the law takes effect.

“I expect technology companies to ensure that the age limit is respected. Children cannot be left with the responsibility for staying away from platforms they are not allowed to use. That responsibility rests with the companies providing these services. They must implement effective age verification and comply with the law from day one,” said Minister of Digitalisation and Public Governance Karianne Tung (Labour).

This approach aligns with broader European regulatory trends, particularly the <a href="https://thecyberexpress.com/breton-vs-musk-over-dsa-violation/" target="_blank" rel="noopener">Digital Services Act</a>, which is expected to require platforms to take stronger accountability for user safety, including age verification measures.
<h3><strong>Part of a Wider European Push</strong></h3>
Norway is among the first countries in Europe to move forward with a nationwide <a href="https://thecyberexpress.com/eu-age-verification-app/" target="_blank" rel="noopener">social media restriction</a> of this kind. However, it is not acting in isolation. Several European governments are exploring or advancing similar policies.

In France, lawmakers have already backed a <a href="https://thecyberexpress.com/social-media-ban-for-children-france/" target="_blank" rel="noopener">proposal to restrict social media</a> use for children under 15, with strong support from President Emmanuel Macron. Spain has also <a href="https://thecyberexpress.com/spain-ban-social-media-platforms-kids/" target="_blank" rel="noopener">announced</a> plans to block access for users aged 15 and under, while the Netherlands is considering a minimum age of 15.

In the United Kingdom, Prime Minister Keir Starmer has <a href="https://thecyberexpress.com/uk-government-social-media-ban-for-children/" target="_blank" rel="noopener">supported tighter controls</a>, with pilot programs underway to assess the impact of limiting social media use among teenagers.

These developments suggest that the Norway social media age limit is part of a broader shift across Europe toward stricter regulation of digital platforms and greater protection for minors.
<h3><strong>Implementation Timeline and Next Steps</strong></h3>
The Norwegian government plans to send the proposed legislation for consultation within the European Economic Area before the summer. This process typically lasts around three months. Full enforcement of the Norway social media age limit is expected once the Digital Services Act is incorporated into Norwegian law.

Officials say recent trends support the move. <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="Data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27983">Data</a> indicates a decline in the number of children owning smartphones and using social media, partly due to national screen-time guidelines and initiatives such as mobile-free schools.

The government intends to implement the policy in stages, but it has made clear that service providers are expected to begin compliance preparations immediately.
<h3><strong>A Shift in Digital Policy</strong></h3>
The Norway social media age limit reflects growing concern among policymakers about the impact of digital platforms on<a href="https://thecyberexpress.com/google-gemini-ai-for-kids/" target="_blank" rel="noopener"> children’s mental health</a>, privacy, and development. By placing legal responsibility on technology companies and aligning with European regulation, Norway is positioning itself at the forefront of this policy shift.

As similar measures gain traction across Europe, the effectiveness of age verification and enforcement will be closely watched.

The Norwegian model could become a reference point for other countries seeking to balance digital access with child protection.]]></description>
										<content:encoded><![CDATA[<p><img width="1376" height="768" src="https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Norway social media age limit" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-1140x636.webp 1140w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-1140x636.webp 1140w" sizes="(max-width: 1376px) 100vw, 1376px" title="Norway to Introduce Social Media Age Limit of 16, Platforms to Enforce Verification 20"></p>The Norway social media age limit is moving closer to becoming law, with the government confirming it will introduce legislation this year to restrict access for children under 16. The proposal, expected to be presented to Parliament (Stortinget), aims to reshape how young users interact with digital platforms and place greater responsibility on technology companies for enforcing age restrictions.

Prime Minister Jonas Gahr Støre said the move is designed to protect childhood experiences from being dominated by screens and algorithms.

He emphasized that children should have space for play, friendships, and offline development, positioning the Norway social media age limit as a safeguard rather than a restriction.
<h3><strong>How the Norway Social Media Age Limit Will Work</strong></h3>
Under the proposed law, the Norway social media age limit will apply from January 1 of the year a child turns 16. This means access will be granted based on birth year rather than exact birthdate, ensuring that entire school cohorts are treated equally. In practice, most children will be at least 15 years old when they gain access.

Minister for Children and Families Lene Vågslid explained that this approach addresses concerns raised during public consultations. Many respondents argued that differences based on birthdates could create social divides among peers. By aligning access with school cohorts, the government aims to balance protection with inclusion.

“For me, it is important both to give better protection for children in the digital world and to listen to what young people are saying. I understand that social media can be an important social arena. We want to ensure inclusion and a sense of community. That is why we are proposing that the cutoff be based on the year of birth rather than the exact birth date, so that cohorts are given equal opportunities, regardless of when each person is born,” <a href="https://www.regjeringen.no/en/whats-new/norwegian-social-media-age-restrictions-law-on-track-to-be-introduced-this-year-this-is-how-the-age-limit-for-social-media-will-work/id3157276/" target="_blank" rel="nofollow noopener">said</a> Minister for Children and Families Lene Vågslid (Labour).

At the same time, officials acknowledge that social media plays a role in young people’s social lives. The policy attempts to maintain that balance while reducing early exposure to potential harms linked to excessive screen time and online interactions.
<h3><strong>Tech Companies to Enforce the Norway Social Media Age Limit</strong></h3>
A key feature of the Norway social media age limit is the shift in responsibility to technology companies. Platforms will be required to implement effective age verification systems at login, ensuring that underage users cannot bypass restrictions.

Minister of Digitalisation and Public Governance Karianne Tung made it clear that enforcement will not rely on children or parents alone. She stated that companies must take full responsibility for compliance and ensure that safeguards are operational from the first day the law takes effect.

“I expect technology companies to ensure that the age limit is respected. Children cannot be left with the responsibility for staying away from platforms they are not allowed to use. That responsibility rests with the companies providing these services. They must implement effective age verification and comply with the law from day one,” said Minister of Digitalisation and Public Governance Karianne Tung (Labour).

This approach aligns with broader European regulatory trends, particularly the <a href="https://thecyberexpress.com/breton-vs-musk-over-dsa-violation/" target="_blank" rel="noopener">Digital Services Act</a>, which is expected to require platforms to take stronger accountability for user safety, including age verification measures.
<h3><strong>Part of a Wider European Push</strong></h3>
Norway is among the first countries in Europe to move forward with a nationwide <a href="https://thecyberexpress.com/eu-age-verification-app/" target="_blank" rel="noopener">social media restriction</a> of this kind. However, it is not acting in isolation. Several European governments are exploring or advancing similar policies.

In France, lawmakers have already backed a <a href="https://thecyberexpress.com/social-media-ban-for-children-france/" target="_blank" rel="noopener">proposal to restrict social media</a> use for children under 15, with strong support from President Emmanuel Macron. Spain has also <a href="https://thecyberexpress.com/spain-ban-social-media-platforms-kids/" target="_blank" rel="noopener">announced</a> plans to block access for users aged 15 and under, while the Netherlands is considering a minimum age of 15.

In the United Kingdom, Prime Minister Keir Starmer has <a href="https://thecyberexpress.com/uk-government-social-media-ban-for-children/" target="_blank" rel="noopener">supported tighter controls</a>, with pilot programs underway to assess the impact of limiting social media use among teenagers.

These developments suggest that the Norway social media age limit is part of a broader shift across Europe toward stricter regulation of digital platforms and greater protection for minors.
<h3><strong>Implementation Timeline and Next Steps</strong></h3>
The Norwegian government plans to send the proposed legislation for consultation within the European Economic Area before the summer. This process typically lasts around three months. Full enforcement of the Norway social media age limit is expected once the Digital Services Act is incorporated into Norwegian law.

Officials say recent trends support the move. <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="Data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27983">Data</a> indicates a decline in the number of children owning smartphones and using social media, partly due to national screen-time guidelines and initiatives such as mobile-free schools.

The government intends to implement the policy in stages, but it has made clear that service providers are expected to begin compliance preparations immediately.
<h3><strong>A Shift in Digital Policy</strong></h3>
The Norway social media age limit reflects growing concern among policymakers about the impact of digital platforms on<a href="https://thecyberexpress.com/google-gemini-ai-for-kids/" target="_blank" rel="noopener"> children’s mental health</a>, privacy, and development. By placing legal responsibility on technology companies and aligning with European regulation, Norway is positioning itself at the forefront of this policy shift.

As similar measures gain traction across Europe, the effectiveness of age verification and enforcement will be closely watched.

The Norwegian model could become a reference point for other countries seeking to balance digital access with child protection.]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111659</post-id>	</item>
		<item>
		<title>The Cyber Express Weekly Roundup: Data Breaches, Malware Campaigns, and Cyber Fraud Investigations</title>
		<link>https://thecyberexpress.com/tce-weekly-roundup-april-2026/</link>
		
		<dc:creator><![CDATA[Ashish Khaitan]]></dc:creator>
		<pubDate>Fri, 24 Apr 2026 11:57:27 +0000</pubDate>
				<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Dark Web News]]></category>
		<category><![CDATA[Data Breach News]]></category>
		<category><![CDATA[Threat Actors]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[cyberattacks]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breaches]]></category>
		<category><![CDATA[data leaks]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<category><![CDATA[weekly roundup]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111644</guid>

					<description><![CDATA[<p><img width="1185" height="685" src="https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="weekly roundup TCE cybersecurity news" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news.webp 1185w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-300x173.webp 300w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-1024x592.webp 1024w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-768x444.webp 768w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-600x347.webp 600w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-150x87.webp 150w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-750x434.webp 750w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-1140x659.webp 1140w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news.webp 1185w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-300x173.webp 300w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-1024x592.webp 1024w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-768x444.webp 768w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-600x347.webp 600w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-150x87.webp 150w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-750x434.webp 750w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-1140x659.webp 1140w" sizes="(max-width: 1185px) 100vw, 1185px" title="The Cyber Express Weekly Roundup: Data Breaches, Malware Campaigns, and Cyber Fraud Investigations 21"></p><span data-contrast="auto">In this week’s edition of <a href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> weekly roundup, we explore the latest developments in the world of cybersecurity, focusing on high-profile data breaches, growing malware campaigns, and law enforcement actions against cybercriminals. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">As the digital threat landscape continues to evolve, attackers are targeting sensitive personal and organizational data, from health records to financial credentials. Meanwhile, government regulators are ramping efforts to protect minors and combat harmful content on social platforms, while cybercriminals continue to <a class="wpil_keyword_link" href="https://cyble.com/exploit/" target="_blank"  rel="noopener" title="exploit" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27978">exploit</a> vulnerabilities in both public and private sectors.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">This weekly roundup highlights how various industries, from healthcare and social media to finance and government, are grappling with rising threats, making it clear that the intersection of data security, regulation, and <a href="https://en.wikipedia.org/wiki/Cybercrime" target="_blank" rel="nofollow noopener">cybercrime</a> is more critical than ever. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">The Cyber Express Weekly Roundup</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<h4 aria-level="3"><b><span data-contrast="none">UK Biobank Data Breach Triggers Urgent Review of Data Security Measures</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">A significant <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-a-data-breach/" target="_blank"  rel="noopener" title="data breach" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27977">data breach</a> at the UK Biobank has raised major concerns over the security of health-related data used in scientific research. In April 2026, de-identified participant information was discovered being sold on a Chinese consumer platform, sparking widespread alarm among the research community. </span><a href="https://thecyberexpress.com/uk-biobank-data-breach-healthcare/" target="_blank" rel="noopener"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">Vercel CEO Reveals Expansion of Malware Campaign Affecting Multiple Targets</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">Vercel's CEO, Guillermo Rauch, confirmed that the recent breach involving Context.ai was part of a much larger <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-malware/"   title="malware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27975">malware</a> campaign affecting multiple targets. Following a review of network logs, Vercel’s security team uncovered evidence of <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-malware/" target="_blank"  rel="noopener" title="malware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27981">malware</a> distribution that compromised several customer accounts, including access to valuable Vercel account keys. </span><a href="https://thecyberexpress.com/vercel-hacker-active-beyond-context-ai-hack/" target="_blank" rel="noopener"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">Ofcom Investigates Telegram and Teen Platforms</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">In the UK, Ofcom has launched an investigation into Telegram and several popular teen chat platforms, such as Teen Chat and Chat Avenue, after reports surfaced of online grooming and child sexual abuse material (CSAM) on these services. Under the Online Safety Act, platforms are required to take proactive steps to prevent harmful content and protect minors from exploitation. </span><a href="https://thecyberexpress.com/ofcom-investigation-targets-telegram/" target="_blank" rel="noopener"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:279}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">Personal Data Exposed in Breach of France’s ANTS Portal</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">A recent breach of France’s ANTS (Agence Nationale des Titres Sécurisés) portal has compromised personal <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27982">data</a>, including names, email addresses, and birthdates, although no documents or sensitive attachments were affected. The breach, which occurred on April 15, 2026, raises significant concerns about identity theft and phishing <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risks" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27974">risks</a>, as the exposed data could be used to target individuals. </span><a href="https://thecyberexpress.com/ants-data-breach-impacts-user-personal-details/" target="_blank" rel="noopener"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">Bluesky Faces Coordinated DDoS Attack</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">Bluesky, the rapidly expanding social media platform, suffered a major disruption on April 15, 2026, when it was targeted by a sophisticated distributed denial-of-service (DDoS) attack. The attack caused widespread outages, impacting core platform functions such as user feeds, notifications, and search capabilities. </span><a href="https://thecyberexpress.com/bluesky-cyberattack-ddos-outage/" target="_blank" rel="noopener"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">Indian Authorities Arrest Key SIM Card Supplier in Cyber Fraud Crackdown</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">India’s Central Bureau of Investigation (CBI) has arrested a key conspirator in a major <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyber" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27979">cyber</a> fraud operation as part of Operation Chakra-V. The suspect, arrested in Guwahati, is accused of supplying fraudulent SIM cards used in various <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/" target="_blank"  rel="noopener" title="cybercrime" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27976">cybercrime</a> schemes, including extortion and fake loan scams. The SIM cards were acquired using fake identities and distributed to cybercriminal networks. </span><a href="https://thecyberexpress.com/indian-agency-arrests-key-sim-card-supplier/" target="_blank" rel="noopener"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Weekly Takeaway</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">This week’s roundup highlights the diverse and evolving nature of cyber threats. From the exposure of sensitive health data and sophisticated malware campaigns to DDoS attacks and SIM card fraud schemes, the <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-cybersecurity/" target="_blank"  rel="noopener" title="cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27973">cybersecurity</a> landscape remains fraught with challenges. </span>

<span data-contrast="auto">Regulatory bodies and companies alike continue to grapple with emerging risks, particularly in sectors like public health data, social media platforms, and digital content safety. As these incidents unfold, it’s clear that both technical vulnerabilities and human factors, such as <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-social-engineering/" target="_blank"  rel="noopener" title="social engineering" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27980">social engineering</a>, continue to be central targets for attackers.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">With regulatory frameworks like the Online Safety Act and increased investigative efforts in places like India and France, the pressure on platforms and authorities to act quickly and decisively is higher than ever. As the cyber threat landscape becomes more interconnected, the need for enhanced security protocols, improved monitoring, and greater accountability in digital spaces remains critical.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>]]></description>
										<content:encoded><![CDATA[<p><img width="1185" height="685" src="https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="weekly roundup TCE cybersecurity news" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news.webp 1185w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-300x173.webp 300w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-1024x592.webp 1024w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-768x444.webp 768w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-600x347.webp 600w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-150x87.webp 150w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-750x434.webp 750w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-1140x659.webp 1140w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news.webp 1185w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-300x173.webp 300w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-1024x592.webp 1024w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-768x444.webp 768w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-600x347.webp 600w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-150x87.webp 150w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-750x434.webp 750w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-1140x659.webp 1140w" sizes="(max-width: 1185px) 100vw, 1185px" title="The Cyber Express Weekly Roundup: Data Breaches, Malware Campaigns, and Cyber Fraud Investigations 22"></p><span data-contrast="auto">In this week’s edition of <a href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> weekly roundup, we explore the latest developments in the world of cybersecurity, focusing on high-profile data breaches, growing malware campaigns, and law enforcement actions against cybercriminals. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">As the digital threat landscape continues to evolve, attackers are targeting sensitive personal and organizational data, from health records to financial credentials. Meanwhile, government regulators are ramping efforts to protect minors and combat harmful content on social platforms, while cybercriminals continue to <a class="wpil_keyword_link" href="https://cyble.com/exploit/" target="_blank"  rel="noopener" title="exploit" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27978">exploit</a> vulnerabilities in both public and private sectors.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">This weekly roundup highlights how various industries, from healthcare and social media to finance and government, are grappling with rising threats, making it clear that the intersection of data security, regulation, and <a href="https://en.wikipedia.org/wiki/Cybercrime" target="_blank" rel="nofollow noopener">cybercrime</a> is more critical than ever. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">The Cyber Express Weekly Roundup</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<h4 aria-level="3"><b><span data-contrast="none">UK Biobank Data Breach Triggers Urgent Review of Data Security Measures</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">A significant <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-a-data-breach/" target="_blank"  rel="noopener" title="data breach" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27977">data breach</a> at the UK Biobank has raised major concerns over the security of health-related data used in scientific research. In April 2026, de-identified participant information was discovered being sold on a Chinese consumer platform, sparking widespread alarm among the research community. </span><a href="https://thecyberexpress.com/uk-biobank-data-breach-healthcare/" target="_blank" rel="noopener"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">Vercel CEO Reveals Expansion of Malware Campaign Affecting Multiple Targets</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">Vercel's CEO, Guillermo Rauch, confirmed that the recent breach involving Context.ai was part of a much larger <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-malware/"   title="malware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27975">malware</a> campaign affecting multiple targets. Following a review of network logs, Vercel’s security team uncovered evidence of <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-malware/" target="_blank"  rel="noopener" title="malware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27981">malware</a> distribution that compromised several customer accounts, including access to valuable Vercel account keys. </span><a href="https://thecyberexpress.com/vercel-hacker-active-beyond-context-ai-hack/" target="_blank" rel="noopener"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">Ofcom Investigates Telegram and Teen Platforms</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">In the UK, Ofcom has launched an investigation into Telegram and several popular teen chat platforms, such as Teen Chat and Chat Avenue, after reports surfaced of online grooming and child sexual abuse material (CSAM) on these services. Under the Online Safety Act, platforms are required to take proactive steps to prevent harmful content and protect minors from exploitation. </span><a href="https://thecyberexpress.com/ofcom-investigation-targets-telegram/" target="_blank" rel="noopener"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:279}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">Personal Data Exposed in Breach of France’s ANTS Portal</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">A recent breach of France’s ANTS (Agence Nationale des Titres Sécurisés) portal has compromised personal <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27982">data</a>, including names, email addresses, and birthdates, although no documents or sensitive attachments were affected. The breach, which occurred on April 15, 2026, raises significant concerns about identity theft and phishing <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risks" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27974">risks</a>, as the exposed data could be used to target individuals. </span><a href="https://thecyberexpress.com/ants-data-breach-impacts-user-personal-details/" target="_blank" rel="noopener"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">Bluesky Faces Coordinated DDoS Attack</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">Bluesky, the rapidly expanding social media platform, suffered a major disruption on April 15, 2026, when it was targeted by a sophisticated distributed denial-of-service (DDoS) attack. The attack caused widespread outages, impacting core platform functions such as user feeds, notifications, and search capabilities. </span><a href="https://thecyberexpress.com/bluesky-cyberattack-ddos-outage/" target="_blank" rel="noopener"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">Indian Authorities Arrest Key SIM Card Supplier in Cyber Fraud Crackdown</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">India’s Central Bureau of Investigation (CBI) has arrested a key conspirator in a major <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyber" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27979">cyber</a> fraud operation as part of Operation Chakra-V. The suspect, arrested in Guwahati, is accused of supplying fraudulent SIM cards used in various <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/" target="_blank"  rel="noopener" title="cybercrime" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27976">cybercrime</a> schemes, including extortion and fake loan scams. The SIM cards were acquired using fake identities and distributed to cybercriminal networks. </span><a href="https://thecyberexpress.com/indian-agency-arrests-key-sim-card-supplier/" target="_blank" rel="noopener"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Weekly Takeaway</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">This week’s roundup highlights the diverse and evolving nature of cyber threats. From the exposure of sensitive health data and sophisticated malware campaigns to DDoS attacks and SIM card fraud schemes, the <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-cybersecurity/" target="_blank"  rel="noopener" title="cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27973">cybersecurity</a> landscape remains fraught with challenges. </span>

<span data-contrast="auto">Regulatory bodies and companies alike continue to grapple with emerging risks, particularly in sectors like public health data, social media platforms, and digital content safety. As these incidents unfold, it’s clear that both technical vulnerabilities and human factors, such as <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-social-engineering/" target="_blank"  rel="noopener" title="social engineering" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27980">social engineering</a>, continue to be central targets for attackers.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">With regulatory frameworks like the Online Safety Act and increased investigative efforts in places like India and France, the pressure on platforms and authorities to act quickly and decisively is higher than ever. As the cyber threat landscape becomes more interconnected, the need for enhanced security protocols, improved monitoring, and greater accountability in digital spaces remains critical.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111644</post-id>	</item>
	</channel>
</rss>