<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>Cybersecurity News and Magazine</title>
	<atom:link href="https://thecyberexpress.com/feed/" rel="self" type="application/rss+xml"/>
	<link>https://thecyberexpress.com</link>
	<description>Trending Cybersecurity News, Updates, Magazine and More.</description>
	<lastBuildDate>Tue, 28 Apr 2026 10:29:21 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://thecyberexpress.com/wp-content/uploads/tce-favicon-75x75.jpg?crop=1</url>
	<title>The Cyber Express</title>
	<link>https://thecyberexpress.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">208869986</site>	<itunes:explicit>no</itunes:explicit><itunes:subtitle>Trending Cybersecurity News, Updates, Magazine and More.</itunes:subtitle><item>
		<title>Cybersecurity Incident Strikes Contractor Handling JRL MRT Stations and NEWater Factory 3 Projects</title>
		<link>https://thecyberexpress.com/cyber-incident-shanghai-tunnel-engineering-co/</link>
		
		<dc:creator><![CDATA[Ashish Khaitan]]></dc:creator>
		<pubDate>Tue, 28 Apr 2026 10:29:17 +0000</pubDate>
				<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Changi NEWater Factory]]></category>
		<category><![CDATA[JRL]]></category>
		<category><![CDATA[Land Transport Authority]]></category>
		<category><![CDATA[Shanghai Tunnel]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111689</guid>

					<description><![CDATA[<p><img width="1101" height="614" src="https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Shanghai Tunnel" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel.webp 1101w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-750x418.webp 750w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel.webp 1101w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-750x418.webp 750w" sizes="(max-width: 1101px) 100vw, 1101px" title="Cybersecurity Incident Strikes Contractor Handling JRL MRT Stations and NEWater Factory 3 Projects 1"></p>A cybersecurity incident has raised concerns after it was revealed that sensitive data associated with the Jurong Region Line (JRL) MRT stations and the Changi NEWater Factory 3 were compromised. The contractor responsible for both critical infrastructure projects, Shanghai Tunnel Engineering Co (Singapore), is currently facing scrutiny as authorities investigate the breach.
<h3 aria-level="2"><b><span data-contrast="none">Data Compromise Involving Shanghai Tunnel Engineering Co</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
The breach primarily affects the civil engineering firm Shanghai Tunnel Engineering Co, which has been engaged in the construction of three key stations along the JRL and the new Changi NEWater Factory 3. While the exact timing of the incident remains unclear, the compromised <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28015">data</a> has since been identified as tender documents for the projects. These documents, however, are available on the government’s GeBIZ procurement portal, which mitigates concerns over the theft of sensitive information.

On April 27, the Land Transport Authority (LTA) responded to public queries by confirming that it was aware of the <a id="menuron" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://thecyberexpress.com/european-space-agency-confirms-cyber-incident/" href="https://thecyberexpress.com/european-space-agency-confirms-cyber-incident/" target="_blank" rel="noreferrer noopener" aria-label="Link cybersecurity breach">cybersecurity breach</a> and had reported the matter to the police and other relevant authorities. In an effort to minimize potential <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risks" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28014">risks</a>, the LTA temporarily suspended the contractor’s access to its digital systems, although the breach has not been reported to have disrupted the ongoing construction of the JRL MRT stations.
<h3 aria-level="2"><b><span data-contrast="none">Impact on Changi NEWater Factory 3</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
While the <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-a-data-breach/" target="_blank"  rel="noopener" title="data breach" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28013">data breach</a> raises alarms, the national water agency PUB (Public Utilities Board) has reassured the public that there has been no access to its digital systems by Shanghai Tunnel Engineering Co. Following an internal investigation, PUB concluded that no sensitive data related to the Changi NEWater Factory 3 had been stolen. The only data compromised were the project tender documents, which, as mentioned, are publicly accessible on GeBIZ.

A <a id="menurop" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://www.straitstimes.com/singapore/contractor-building-jrl-stations-and-newater-factory-hit-by-data-breach" href="https://www.straitstimes.com/singapore/contractor-building-jrl-stations-and-newater-factory-hit-by-data-breach" target="_blank" rel="noreferrer noopener" aria-label="Link PUB spokesperson emphasized">PUB spokesperson emphasized</a> that the agency maintains a "serious view" of cybersecurity and has advised the contractor to review its security protocols. Despite extensive checks on known ransomware portals and <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-a-hacker/"   title="hacker" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28012">hacker</a> forums, no evidence of leaked data related to the breach has surfaced, alleviating some concerns among stakeholders.
<h3 aria-level="2"><b><span data-contrast="none">Company’s Response to Cybersecurity Incident</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
In a statement issued on April 28, Shanghai Tunnel Engineering Co (Singapore) acknowledged the <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-cybersecurity/"   title="cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28011">cybersecurity</a> incident, confirming that it had taken immediate steps to contain the situation. While the company did not specify when the breach occurred, it assured the public that it was cooperating fully with the authorities. Furthermore, the company has enlisted an external <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-cybersecurity/" target="_blank"  rel="noopener" title="cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28016">cybersecurity</a> specialist to aid in the investigation.

"We are cooperating fully with the relevant authorities and kindly request that all parties allow the investigation to proceed without interference," a company representative said.

Shanghai Tunnel Engineering Co, established in 1996, is a well-established contractor with significant experience in MRT projects across Singapore. The firm has previously worked on various stations for the Circle, Downtown, and Thomson-East Coast lines. Its latest projects involve critical infrastructure, including the JRL stations and the Changi NEWater Factory 3.
<h3 aria-level="2"><b><span data-contrast="none">Contract Details and Future Expectations</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
In 2019, Shanghai Tunnel Engineering Co was awarded a $465.2 million contract to design and build three JRL stations, Choa Chu Kang, Choa Chu Kang West, and Tengah—along with a 4.3km viaduct connecting them. This work includes integrating the existing Choa Chu Kang MRT station on the North-South Line into the JRL network.

In addition to the JRL projects, Shanghai Tunnel Engineering Co is also involved in the construction of the Changi NEWater Factory 3. In November 2025, a $205 million contract was awarded to Sanli M&amp;E Engineering, which formed a joint venture with Shanghai Tunnel Engineering Co in February 2026. The joint venture will be responsible for several key aspects of the factory’s construction, including civil, structural, and architectural works, as well as external and building services.

The Changi NEWater Factory 3 is expected to be operational by 2028 and will replace the existing Bedok facility. Once completed, the factory will be capable of producing up to 50 million gallons of NEWater daily, contributing significantly to Singapore's water sustainability efforts.]]></description>
										<content:encoded><![CDATA[<p><img width="1101" height="614" src="https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Shanghai Tunnel" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel.webp 1101w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-750x418.webp 750w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel.webp 1101w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Shanghai-Tunnel-750x418.webp 750w" sizes="(max-width: 1101px) 100vw, 1101px" title="Cybersecurity Incident Strikes Contractor Handling JRL MRT Stations and NEWater Factory 3 Projects 2"></p>A cybersecurity incident has raised concerns after it was revealed that sensitive data associated with the Jurong Region Line (JRL) MRT stations and the Changi NEWater Factory 3 were compromised. The contractor responsible for both critical infrastructure projects, Shanghai Tunnel Engineering Co (Singapore), is currently facing scrutiny as authorities investigate the breach.
<h3 aria-level="2"><b><span data-contrast="none">Data Compromise Involving Shanghai Tunnel Engineering Co</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
The breach primarily affects the civil engineering firm Shanghai Tunnel Engineering Co, which has been engaged in the construction of three key stations along the JRL and the new Changi NEWater Factory 3. While the exact timing of the incident remains unclear, the compromised <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28015">data</a> has since been identified as tender documents for the projects. These documents, however, are available on the government’s GeBIZ procurement portal, which mitigates concerns over the theft of sensitive information.

On April 27, the Land Transport Authority (LTA) responded to public queries by confirming that it was aware of the <a id="menuron" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://thecyberexpress.com/european-space-agency-confirms-cyber-incident/" href="https://thecyberexpress.com/european-space-agency-confirms-cyber-incident/" target="_blank" rel="noreferrer noopener" aria-label="Link cybersecurity breach">cybersecurity breach</a> and had reported the matter to the police and other relevant authorities. In an effort to minimize potential <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risks" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28014">risks</a>, the LTA temporarily suspended the contractor’s access to its digital systems, although the breach has not been reported to have disrupted the ongoing construction of the JRL MRT stations.
<h3 aria-level="2"><b><span data-contrast="none">Impact on Changi NEWater Factory 3</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
While the <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-a-data-breach/" target="_blank"  rel="noopener" title="data breach" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28013">data breach</a> raises alarms, the national water agency PUB (Public Utilities Board) has reassured the public that there has been no access to its digital systems by Shanghai Tunnel Engineering Co. Following an internal investigation, PUB concluded that no sensitive data related to the Changi NEWater Factory 3 had been stolen. The only data compromised were the project tender documents, which, as mentioned, are publicly accessible on GeBIZ.

A <a id="menurop" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://www.straitstimes.com/singapore/contractor-building-jrl-stations-and-newater-factory-hit-by-data-breach" href="https://www.straitstimes.com/singapore/contractor-building-jrl-stations-and-newater-factory-hit-by-data-breach" target="_blank" rel="noreferrer noopener" aria-label="Link PUB spokesperson emphasized">PUB spokesperson emphasized</a> that the agency maintains a "serious view" of cybersecurity and has advised the contractor to review its security protocols. Despite extensive checks on known ransomware portals and <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-a-hacker/"   title="hacker" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28012">hacker</a> forums, no evidence of leaked data related to the breach has surfaced, alleviating some concerns among stakeholders.
<h3 aria-level="2"><b><span data-contrast="none">Company’s Response to Cybersecurity Incident</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
In a statement issued on April 28, Shanghai Tunnel Engineering Co (Singapore) acknowledged the <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-cybersecurity/"   title="cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28011">cybersecurity</a> incident, confirming that it had taken immediate steps to contain the situation. While the company did not specify when the breach occurred, it assured the public that it was cooperating fully with the authorities. Furthermore, the company has enlisted an external <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-cybersecurity/" target="_blank"  rel="noopener" title="cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28016">cybersecurity</a> specialist to aid in the investigation.

"We are cooperating fully with the relevant authorities and kindly request that all parties allow the investigation to proceed without interference," a company representative said.

Shanghai Tunnel Engineering Co, established in 1996, is a well-established contractor with significant experience in MRT projects across Singapore. The firm has previously worked on various stations for the Circle, Downtown, and Thomson-East Coast lines. Its latest projects involve critical infrastructure, including the JRL stations and the Changi NEWater Factory 3.
<h3 aria-level="2"><b><span data-contrast="none">Contract Details and Future Expectations</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
In 2019, Shanghai Tunnel Engineering Co was awarded a $465.2 million contract to design and build three JRL stations, Choa Chu Kang, Choa Chu Kang West, and Tengah—along with a 4.3km viaduct connecting them. This work includes integrating the existing Choa Chu Kang MRT station on the North-South Line into the JRL network.

In addition to the JRL projects, Shanghai Tunnel Engineering Co is also involved in the construction of the Changi NEWater Factory 3. In November 2025, a $205 million contract was awarded to Sanli M&amp;E Engineering, which formed a joint venture with Shanghai Tunnel Engineering Co in February 2026. The joint venture will be responsible for several key aspects of the factory’s construction, including civil, structural, and architectural works, as well as external and building services.

The Changi NEWater Factory 3 is expected to be operational by 2028 and will replace the existing Bedok facility. Once completed, the factory will be capable of producing up to 50 million gallons of NEWater daily, contributing significantly to Singapore's water sustainability efforts.]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111689</post-id>	</item>
		<item>
		<title>Medtronic Confirms Data Breach, No Impact on Operations or Patient Safety</title>
		<link>https://thecyberexpress.com/medtronic-data-breach-april-2026/</link>
		
		<dc:creator><![CDATA[Ashish Khaitan]]></dc:creator>
		<pubDate>Tue, 28 Apr 2026 10:25:21 +0000</pubDate>
				<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Data Breach News]]></category>
		<category><![CDATA[data breach at Medtronic]]></category>
		<category><![CDATA[Medtronic data breach]]></category>
		<category><![CDATA[SEC]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111694</guid>

					<description><![CDATA[<p><img width="1101" height="614" src="https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Medtronic data breach" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach.webp 1101w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-750x418.webp 750w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach.webp 1101w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-750x418.webp 750w" sizes="(max-width: 1101px) 100vw, 1101px" title="Medtronic Confirms Data Breach, No Impact on Operations or Patient Safety 3"></p>Medtronic, the global leader in medical technology, disclosed a data breach affecting its corporate IT systems. On April 24, the company confirmed that an unauthorized third party gained access to certain systems, although the Medtronic data breach is not expected to have any material impact on the company’s financial performance or business operations.

The breach has raised concerns across the healthcare and medtech sectors, but Medtronic assured investors and customers that it had taken immediate action to contain the situation.
<h3 aria-level="2"><b><span data-contrast="none">What Happened to the Medtronic Data Breach?</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
The Medtronic <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28009">data</a> breach, which was identified on April 24, involved unauthorized access to some of Medtronic’s corporate IT systems. However, the company was quick to clarify that no disruption had occurred in key operational areas, including product safety, customer connections, and manufacturing or distribution activities. Importantly, there was no reported impact on patient safety or the company’s ability to meet its patient care commitments.

In a <a id="menurob" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://app.quotemedia.com/data/downloadfiling?webmasterid=101533&amp;ref=319979674&amp;type=pdf&amp;symbol=mdt&amp;cdn=83dd8d0bda390cc08b7e0796ad099fb8&amp;companyname=medtronic+plc.&amp;formtype=8-k&amp;datefiled=2026-04-27" href="https://app.quotemedia.com/data/downloadFiling?webmasterId=101533&amp;ref=319979674&amp;type=PDF&amp;symbol=MDT&amp;cdn=83dd8d0bda390cc08b7e0796ad099fb8&amp;companyName=Medtronic+plc.&amp;formType=8-K&amp;dateFiled=2026-04-27" target="_blank" rel="noreferrer noopener" aria-label="Link public filing">public filing</a> with the U.S. Securities and Exchange Commission (SEC), Medtronic stated, “We have not identified any impact to our products, patient safety, connections to our customers, our manufacturing and distribution operations, or our financial reporting systems.” The company emphasized that the networks supporting corporate IT systems are separate from those used for products, manufacturing, and distribution, which remain unaffected by the breach.

Additionally, Medtronic <a id="menurod" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://news.medtronic.com/medtronic-statement-on-unauthorized-system-access" href="https://news.medtronic.com/Medtronic-statement-on-unauthorized-system-access" target="_blank" rel="noreferrer noopener" aria-label="Link highlighted">highlighted</a> that the IT systems supporting <a id="menurof" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://thecyberexpress.com/cyberattacks-on-hospitals-by-uac-0247-hackers/" href="https://thecyberexpress.com/cyberattacks-on-hospitals-by-uac-0247-hackers/" target="_blank" rel="noreferrer noopener" aria-label="Link hospitals">hospitals</a> and healthcare customers are managed separately and secured by the customers’ IT teams. As such, hospital networks were not impacted by the breach, nor was there any disruption to hospital operations or services.
<h3 aria-level="2"><b><span data-contrast="none">Immediate Actions Taken by Medtronic</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
Following the identification of the breach, Medtronic moved quickly to contain the incident. The company activated its incident response protocols and sought assistance from <a id="menuroh" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://thecyberexpress.com/cybersecurity-experts-arrested/" href="https://thecyberexpress.com/cybersecurity-experts-arrested/" target="_blank" rel="noreferrer noopener" aria-label="Link cybersecurity experts">cybersecurity experts</a> to investigate the breach and implement necessary remediation measures.

Medtronic has also initiated an effort to determine if any personal information was accessed during the breach. If any sensitive data has been compromised, the company assured it would provide necessary notifications and support services to affected individuals.

The company remains committed to enhancing its <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-cybersecurity/" target="_blank"  rel="noopener" title="cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28005">cybersecurity</a> measures. “We are simultaneously identifying additional ways to further optimize our system <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28010">security</a>,” said a Medtronic spokesperson. The company has also assured its stakeholders that it does not expect the incident to have an impact on its financial results or overall business operations.
<h3 aria-level="2"><b><span data-contrast="none">The Broader Impact on the Medtech Sector</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
The <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-a-data-breach/" target="_blank"  rel="noopener" title="data breach" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28008">data breach</a> at Medtronic follows a series of similar cybersecurity incidents that have affected other companies in the medtech industry. In March 2026, a cyberattack disrupted operations at <a id="menuroj" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://thecyberexpress.com/endpoint-management-systems-cisa/" href="https://thecyberexpress.com/endpoint-management-systems-cisa/" target="_blank" rel="noreferrer noopener" aria-label="Link Stryker">Stryker</a>, another major player in the medical technology sector. The attack targeted Stryker’s Microsoft environment, affecting ordering, shipping, and manufacturing processes. It took several weeks for Stryker to fully recover and return to normal operations.

Simultaneously, Intuitive Surgical, a leading manufacturer of surgical robots, reported a <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-phishing/" target="_blank"  rel="noopener" title="phishing" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28006">phishing</a> incident. The unauthorized party gained access to sensitive customer, employee, and corporate data. Intuitive Surgical also claimed that the issue was contained without significant financial impact, echoing Medtronic’s own assessment that the data breach would not affect its financial standing.

These incidents highlight the frequency and sophistication of cyberattacks within the <a id="menurol" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://thecyberexpress.com/signature-healthcare-cyberattack/" href="https://thecyberexpress.com/signature-healthcare-cyberattack/" target="_blank" rel="noreferrer noopener" aria-label="Link healthcare">healthcare</a> and medtech industries. As digital transformation accelerates in these sectors, companies are vulnerable to <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyber" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28007">cyber</a> threats.]]></description>
										<content:encoded><![CDATA[<p><img width="1101" height="614" src="https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Medtronic data breach" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach.webp 1101w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-750x418.webp 750w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach.webp 1101w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Medtronic-data-breach-750x418.webp 750w" sizes="(max-width: 1101px) 100vw, 1101px" title="Medtronic Confirms Data Breach, No Impact on Operations or Patient Safety 4"></p>Medtronic, the global leader in medical technology, disclosed a data breach affecting its corporate IT systems. On April 24, the company confirmed that an unauthorized third party gained access to certain systems, although the Medtronic data breach is not expected to have any material impact on the company’s financial performance or business operations.

The breach has raised concerns across the healthcare and medtech sectors, but Medtronic assured investors and customers that it had taken immediate action to contain the situation.
<h3 aria-level="2"><b><span data-contrast="none">What Happened to the Medtronic Data Breach?</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
The Medtronic <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28009">data</a> breach, which was identified on April 24, involved unauthorized access to some of Medtronic’s corporate IT systems. However, the company was quick to clarify that no disruption had occurred in key operational areas, including product safety, customer connections, and manufacturing or distribution activities. Importantly, there was no reported impact on patient safety or the company’s ability to meet its patient care commitments.

In a <a id="menurob" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://app.quotemedia.com/data/downloadfiling?webmasterid=101533&amp;ref=319979674&amp;type=pdf&amp;symbol=mdt&amp;cdn=83dd8d0bda390cc08b7e0796ad099fb8&amp;companyname=medtronic+plc.&amp;formtype=8-k&amp;datefiled=2026-04-27" href="https://app.quotemedia.com/data/downloadFiling?webmasterId=101533&amp;ref=319979674&amp;type=PDF&amp;symbol=MDT&amp;cdn=83dd8d0bda390cc08b7e0796ad099fb8&amp;companyName=Medtronic+plc.&amp;formType=8-K&amp;dateFiled=2026-04-27" target="_blank" rel="noreferrer noopener" aria-label="Link public filing">public filing</a> with the U.S. Securities and Exchange Commission (SEC), Medtronic stated, “We have not identified any impact to our products, patient safety, connections to our customers, our manufacturing and distribution operations, or our financial reporting systems.” The company emphasized that the networks supporting corporate IT systems are separate from those used for products, manufacturing, and distribution, which remain unaffected by the breach.

Additionally, Medtronic <a id="menurod" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://news.medtronic.com/medtronic-statement-on-unauthorized-system-access" href="https://news.medtronic.com/Medtronic-statement-on-unauthorized-system-access" target="_blank" rel="noreferrer noopener" aria-label="Link highlighted">highlighted</a> that the IT systems supporting <a id="menurof" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://thecyberexpress.com/cyberattacks-on-hospitals-by-uac-0247-hackers/" href="https://thecyberexpress.com/cyberattacks-on-hospitals-by-uac-0247-hackers/" target="_blank" rel="noreferrer noopener" aria-label="Link hospitals">hospitals</a> and healthcare customers are managed separately and secured by the customers’ IT teams. As such, hospital networks were not impacted by the breach, nor was there any disruption to hospital operations or services.
<h3 aria-level="2"><b><span data-contrast="none">Immediate Actions Taken by Medtronic</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
Following the identification of the breach, Medtronic moved quickly to contain the incident. The company activated its incident response protocols and sought assistance from <a id="menuroh" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://thecyberexpress.com/cybersecurity-experts-arrested/" href="https://thecyberexpress.com/cybersecurity-experts-arrested/" target="_blank" rel="noreferrer noopener" aria-label="Link cybersecurity experts">cybersecurity experts</a> to investigate the breach and implement necessary remediation measures.

Medtronic has also initiated an effort to determine if any personal information was accessed during the breach. If any sensitive data has been compromised, the company assured it would provide necessary notifications and support services to affected individuals.

The company remains committed to enhancing its <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-cybersecurity/" target="_blank"  rel="noopener" title="cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28005">cybersecurity</a> measures. “We are simultaneously identifying additional ways to further optimize our system <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28010">security</a>,” said a Medtronic spokesperson. The company has also assured its stakeholders that it does not expect the incident to have an impact on its financial results or overall business operations.
<h3 aria-level="2"><b><span data-contrast="none">The Broader Impact on the Medtech Sector</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
The <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-a-data-breach/" target="_blank"  rel="noopener" title="data breach" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28008">data breach</a> at Medtronic follows a series of similar cybersecurity incidents that have affected other companies in the medtech industry. In March 2026, a cyberattack disrupted operations at <a id="menuroj" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://thecyberexpress.com/endpoint-management-systems-cisa/" href="https://thecyberexpress.com/endpoint-management-systems-cisa/" target="_blank" rel="noreferrer noopener" aria-label="Link Stryker">Stryker</a>, another major player in the medical technology sector. The attack targeted Stryker’s Microsoft environment, affecting ordering, shipping, and manufacturing processes. It took several weeks for Stryker to fully recover and return to normal operations.

Simultaneously, Intuitive Surgical, a leading manufacturer of surgical robots, reported a <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-phishing/" target="_blank"  rel="noopener" title="phishing" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28006">phishing</a> incident. The unauthorized party gained access to sensitive customer, employee, and corporate data. Intuitive Surgical also claimed that the issue was contained without significant financial impact, echoing Medtronic’s own assessment that the data breach would not affect its financial standing.

These incidents highlight the frequency and sophistication of cyberattacks within the <a id="menurol" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://thecyberexpress.com/signature-healthcare-cyberattack/" href="https://thecyberexpress.com/signature-healthcare-cyberattack/" target="_blank" rel="noreferrer noopener" aria-label="Link healthcare">healthcare</a> and medtech industries. As digital transformation accelerates in these sectors, companies are vulnerable to <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyber" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28007">cyber</a> threats.]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111694</post-id>	</item>
		<item>
		<title>Notepad++ Releases 8.9.4 Patch to Fix String Injection Vulnerability (CVE-2026-3008) in 8.9.3</title>
		<link>https://thecyberexpress.com/notepad-cve-2026-3008-vulnerability/</link>
		
		<dc:creator><![CDATA[Ashish Khaitan]]></dc:creator>
		<pubDate>Tue, 28 Apr 2026 10:20:13 +0000</pubDate>
				<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[Vulnerability News]]></category>
		<category><![CDATA[CVE-2026-3008]]></category>
		<category><![CDATA[Notepad++]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111698</guid>

					<description><![CDATA[<p><img width="1101" height="614" src="https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CVE-2026-3008" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008.webp 1101w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-750x418.webp 750w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008.webp 1101w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-750x418.webp 750w" sizes="(max-width: 1101px) 100vw, 1101px" title="Notepad++ Releases 8.9.4 Patch to Fix String Injection Vulnerability (CVE-2026-3008) in 8.9.3 5"></p>A vulnerability has been identified in the popular open-source text editor, Notepad++, with the release of CVE-2026-3008. The vulnerability, discovered and reported by CSA under its Responsibility Vulnerability Disclosure Policy, is linked to a potential string injection flaw in Notepad++ version 8.9.3. To mitigate the risk associated with this vulnerability, users and administrators are strongly urged to update their installations to version 8.9.4 immediately.
<h3 aria-level="2"><b><span data-contrast="none">A Deeper Look at CVE-2026-3008</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
The CVE-2026-3008 bug addresses a string-injection <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/vulnerabilities/"   title="vulnerability" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28000">vulnerability</a> in Notepad++, a widely used text editor for software development, writing, and other professional environments. The vulnerability allows attackers to <a class="wpil_keyword_link" href="https://cyble.com/exploit/" target="_blank"  rel="noopener" title="exploit" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28004">exploit</a> it, potentially gaining access to sensitive memory to read information or, in some cases, causing the application to crash.

This flaw was first flagged by a contributor, Hazley Samsudin, whose prompt reporting allowed the Notepad++ team to act swiftly to resolve the issue.  As part of Notepad++'s ongoing <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27998">security</a> commitment, the Product Owner quickly released an official patch in version 8.9.4 to rectify the issue, ensuring the software remains secure for all users.
<h3 aria-level="2"><b><span data-contrast="none">The Impact of CVE-2026-3008 on Notepad++ Users</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
The vulnerability in Notepad++ version 8.9.3 has the potential for significant impacts on users. If successfully exploited, attackers could manipulate the string <a id="menurd8" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://thecyberexpress.com/command-injection-vulnerability-in-cisco-urwb/" href="https://thecyberexpress.com/command-injection-vulnerability-in-cisco-urwb/" target="_blank" rel="noreferrer noopener" aria-label="Link injection vulnerability">injection vulnerability</a> to access memory addresses or even crash the application entirely. This could compromise the integrity of unsaved <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27999">data</a> or disrupt workflow, particularly in environments where Notepad++ is a critical tool for coding or note-taking.

While this vulnerability may not allow for direct execution of arbitrary code, its potential for causing application crashes poses a <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risk" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28001">risk</a> to stability, especially if users are working with large or complex files. Given the widespread use of Notepad++ across multiple industries, it is crucial for users to take immediate action by upgrading to the secure 8.9.4 version.
<h3 aria-level="2"><b><span data-contrast="none">Affected Versions of Notepad++</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">The vulnerability (CVE-2026-3008) is present exclusively in Notepad++ version 8.9.3. Therefore, anyone using this version or earlier versions is at risk of <a href="https://thecyberexpress.com/forticlientems-flaws-under-active-exploitation/" target="_blank" rel="noopener">exploitation</a>. The update to version 8.9.4, which includes necessary security patches, should be prioritized to prevent any potential exploitation of this vulnerability.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Users of Notepad++ are strongly encouraged to update their installations to the latest version, 8.9.4, which has been designed to address the <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/"   title="vulnerabilities" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28002">vulnerabilities</a> identified, including CVE-2026-3008. The Notepad++ development team worked quickly to release this update, which also includes a series of bug fixes and performance improvements.</span>

<span data-contrast="auto">To ensure that systems remain secure, users can download the latest release directly from the official Notepad++ website or the <a href="https://thecyberexpress.com/researchers-exploit-github-actions-artifacts/" target="_blank" rel="noopener">GitHub repository</a>. Administrators managing multiple machines should push the update across their networks to guarantee all affected systems are secured.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">In addition to this update, Notepad++ version 8.9.4 includes several other improvements aimed at enhancing the software's overall stability and performance. These include fixes for crashes related to undo actions, improvements to file path handling, and updates to Scintilla and Lexilla for better language processing.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Notable Fixes in Notepad++ v8.9.4</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">The <a href="https://community.notepad-plus-plus.org/topic/27500/notepad-v8-9-4-release-candidate/3" target="_blank" rel="nofollow noopener">v8.9.4 update</a> not only resolves the CVE-2026-3008 vulnerability but also brings a host of other important bug fixes and stability improvements. Some of the notable changes include:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<ul>
 	<li><b><span data-contrast="auto">Fixes to Crashes</span></b><span data-contrast="auto">: Issues such as crashes when using the FindInFiles feature or when dropping files with long paths (over 259 characters) have been addressed. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><b><span data-contrast="auto">Undo Action Issues</span></b><span data-contrast="auto">: Previous versions had an issue with crashes caused by undoing actions in the column editor, especially when bad inputs were entered. This issue has now been resolved. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><b><span data-contrast="auto">UI and Rendering Fixes</span></b><span data-contrast="auto">: Improvements have been made to the user interface, including fixes for visual glitches in the Mark dialog and <a class="wpil_keyword_link" href="https://thecyberexpress.com/how-to-password-protect-a-word-document/"   title="Document" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28003">Document</a> List view. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><b><span data-contrast="auto">Improved Language Support</span></b><span data-contrast="auto">: Updates to Scintilla and Lexilla provide better handling of C++ 11 raw string literals and enhanced syntax highlighting for various file formats. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<span data-contrast="auto">Additionally, the update addresses installation issues that impacted users of the MSI installer, including problems with context menu registrations and incorrect hexadecimal display names during installation.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>]]></description>
										<content:encoded><![CDATA[<p><img width="1101" height="614" src="https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CVE-2026-3008" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008.webp 1101w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-750x418.webp 750w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008.webp 1101w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-3008-750x418.webp 750w" sizes="(max-width: 1101px) 100vw, 1101px" title="Notepad++ Releases 8.9.4 Patch to Fix String Injection Vulnerability (CVE-2026-3008) in 8.9.3 6"></p>A vulnerability has been identified in the popular open-source text editor, Notepad++, with the release of CVE-2026-3008. The vulnerability, discovered and reported by CSA under its Responsibility Vulnerability Disclosure Policy, is linked to a potential string injection flaw in Notepad++ version 8.9.3. To mitigate the risk associated with this vulnerability, users and administrators are strongly urged to update their installations to version 8.9.4 immediately.
<h3 aria-level="2"><b><span data-contrast="none">A Deeper Look at CVE-2026-3008</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
The CVE-2026-3008 bug addresses a string-injection <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/vulnerabilities/"   title="vulnerability" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28000">vulnerability</a> in Notepad++, a widely used text editor for software development, writing, and other professional environments. The vulnerability allows attackers to <a class="wpil_keyword_link" href="https://cyble.com/exploit/" target="_blank"  rel="noopener" title="exploit" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28004">exploit</a> it, potentially gaining access to sensitive memory to read information or, in some cases, causing the application to crash.

This flaw was first flagged by a contributor, Hazley Samsudin, whose prompt reporting allowed the Notepad++ team to act swiftly to resolve the issue.  As part of Notepad++'s ongoing <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27998">security</a> commitment, the Product Owner quickly released an official patch in version 8.9.4 to rectify the issue, ensuring the software remains secure for all users.
<h3 aria-level="2"><b><span data-contrast="none">The Impact of CVE-2026-3008 on Notepad++ Users</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
The vulnerability in Notepad++ version 8.9.3 has the potential for significant impacts on users. If successfully exploited, attackers could manipulate the string <a id="menurd8" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://thecyberexpress.com/command-injection-vulnerability-in-cisco-urwb/" href="https://thecyberexpress.com/command-injection-vulnerability-in-cisco-urwb/" target="_blank" rel="noreferrer noopener" aria-label="Link injection vulnerability">injection vulnerability</a> to access memory addresses or even crash the application entirely. This could compromise the integrity of unsaved <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27999">data</a> or disrupt workflow, particularly in environments where Notepad++ is a critical tool for coding or note-taking.

While this vulnerability may not allow for direct execution of arbitrary code, its potential for causing application crashes poses a <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risk" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28001">risk</a> to stability, especially if users are working with large or complex files. Given the widespread use of Notepad++ across multiple industries, it is crucial for users to take immediate action by upgrading to the secure 8.9.4 version.
<h3 aria-level="2"><b><span data-contrast="none">Affected Versions of Notepad++</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">The vulnerability (CVE-2026-3008) is present exclusively in Notepad++ version 8.9.3. Therefore, anyone using this version or earlier versions is at risk of <a href="https://thecyberexpress.com/forticlientems-flaws-under-active-exploitation/" target="_blank" rel="noopener">exploitation</a>. The update to version 8.9.4, which includes necessary security patches, should be prioritized to prevent any potential exploitation of this vulnerability.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Users of Notepad++ are strongly encouraged to update their installations to the latest version, 8.9.4, which has been designed to address the <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/"   title="vulnerabilities" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28002">vulnerabilities</a> identified, including CVE-2026-3008. The Notepad++ development team worked quickly to release this update, which also includes a series of bug fixes and performance improvements.</span>

<span data-contrast="auto">To ensure that systems remain secure, users can download the latest release directly from the official Notepad++ website or the <a href="https://thecyberexpress.com/researchers-exploit-github-actions-artifacts/" target="_blank" rel="noopener">GitHub repository</a>. Administrators managing multiple machines should push the update across their networks to guarantee all affected systems are secured.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">In addition to this update, Notepad++ version 8.9.4 includes several other improvements aimed at enhancing the software's overall stability and performance. These include fixes for crashes related to undo actions, improvements to file path handling, and updates to Scintilla and Lexilla for better language processing.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Notable Fixes in Notepad++ v8.9.4</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">The <a href="https://community.notepad-plus-plus.org/topic/27500/notepad-v8-9-4-release-candidate/3" target="_blank" rel="nofollow noopener">v8.9.4 update</a> not only resolves the CVE-2026-3008 vulnerability but also brings a host of other important bug fixes and stability improvements. Some of the notable changes include:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<ul>
 	<li><b><span data-contrast="auto">Fixes to Crashes</span></b><span data-contrast="auto">: Issues such as crashes when using the FindInFiles feature or when dropping files with long paths (over 259 characters) have been addressed. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><b><span data-contrast="auto">Undo Action Issues</span></b><span data-contrast="auto">: Previous versions had an issue with crashes caused by undoing actions in the column editor, especially when bad inputs were entered. This issue has now been resolved. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><b><span data-contrast="auto">UI and Rendering Fixes</span></b><span data-contrast="auto">: Improvements have been made to the user interface, including fixes for visual glitches in the Mark dialog and <a class="wpil_keyword_link" href="https://thecyberexpress.com/how-to-password-protect-a-word-document/"   title="Document" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28003">Document</a> List view. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><b><span data-contrast="auto">Improved Language Support</span></b><span data-contrast="auto">: Updates to Scintilla and Lexilla provide better handling of C++ 11 raw string literals and enhanced syntax highlighting for various file formats. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<span data-contrast="auto">Additionally, the update addresses installation issues that impacted users of the MSI installer, including problems with context menu registrations and incorrect hexadecimal display names during installation.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111698</post-id>	</item>
		<item>
		<title>Toronto Police Bust Mobile Smishing Network Targeting Thousands</title>
		<link>https://thecyberexpress.com/canada-sms-blaster-cybercrime-case/</link>
		
		<dc:creator><![CDATA[Samiksha Jain]]></dc:creator>
		<pubDate>Mon, 27 Apr 2026 12:20:24 +0000</pubDate>
				<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Canada SMS blaster cybercrime case]]></category>
		<category><![CDATA[SMS Blaster Cybercrime]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<category><![CDATA[Toronto Police]]></category>
		<category><![CDATA[Type of Cyber Threat in Canada]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111682</guid>

					<description><![CDATA[<p><img width="1376" height="768" src="https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Canada SMS blaster cybercrime case" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-1140x636.webp 1140w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-1140x636.webp 1140w" sizes="(max-width: 1376px) 100vw, 1376px" title="Toronto Police Bust Mobile Smishing Network Targeting Thousands 7"></p>A major Canada SMS blaster cybercrime case has come to light as Toronto Police charge three men with 44 offences in what authorities describe as a first-of-its-kind investigation in the country. The case, part of Project Lighthouse, highlights a growing threat where <a href="https://thecyberexpress.com/nation-state-hackers-weaponize-winrar-flaw/" target="_blank" rel="noopener">cybercriminals</a> use mobile technology to target thousands of people at once.

The investigation began in November 2025 after a security partner alerted police to a suspected SMS blaster operating in downtown Toronto. What followed was a months-long probe into a sophisticated operation that combined mobility, deception, and large-scale disruption.
<h3>What Is the Canada SMS Blaster Cybercrime Case?</h3>
At the center of the Canada SMS blaster <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/" target="_blank"  rel="noopener" title="cybercrime" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27996">cybercrime</a> case is a device that mimics a legitimate cellular tower. When nearby <a href="https://thecyberexpress.com/how-to-find-hidden-cameras-using-mobile-phones/" target="_blank" rel="noopener">mobile phones</a> connect to it, users receive fraudulent messages that appear to come from trusted organizations. These messages often include links to fake websites designed to steal sensitive information such as banking credentials and <a href="https://thecyberexpress.com/steps-to-create-unbreakable-passwords/" target="_blank" rel="noopener">passwords</a>.

This method is widely known as “<a href="https://thecyberexpress.com/smishing-and-vishing-in-2025/" target="_blank" rel="noopener">smishing</a>,” a form of phishing carried out through text messages. However, the scale and mobility of the device used in this case set it apart from typical <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyber" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27995">cyber</a> fraud schemes.

Deputy Chief Rob Johnson <a href="https://www.tps.ca/media-centre/stories/unprecedented-sms-blaster-arrests/" target="_blank" rel="nofollow noopener">said</a> the operation posed serious risks beyond financial fraud. He noted that the technology had the capability to reach thousands of devices simultaneously, raising concerns about public safety.
<h3>Large-Scale Disruption Across the Greater Toronto Area</h3>
Investigators found that the SMS blaster was not stationary. It was operated from vehicles, allowing suspects to move across the Greater Toronto Area and deploy the device in multiple locations.

According to Detective Sergeant Lindsay Riddell, tens of thousands of devices connected to the rogue network over several months. Police also recorded more than 13 million network disruptions, during which affected devices were unable to connect to legitimate cellular networks.

These disruptions had serious implications. During those moments, access to emergency services such as 9-1-1 could have been impacted, making the Canada SMS blaster cybercrime case not just a financial threat but also a public safety concern.
<h3>Arrests and Seizure of Devices</h3>
Toronto Police executed search warrants on March 31 at residences in Markham and Hamilton, leading to the arrest of two suspects. Authorities seized multiple SMS blasters along with a significant amount of electronic evidence.

A third individual later turned himself in on April 21. All three now face a combined total of 44 charges linked to the operation.

The Canada SMS blaster cybercrime case involved extensive coordination between multiple agencies, including the Royal Canadian Mounted Police National Cybercrime Coordination Centre, regional police services, financial institutions, and telecom providers. Officials say this collaboration was key to identifying and disrupting the activity.
<h3>A New Type of Cyber Threat in Canada</h3>
Law enforcement officials emphasized that this is the first known case of SMS blaster technology being used in Canada. The case reflects how cyber-enabled crimes are becoming more advanced and harder to detect.

Authorities noted that while the technology is new, the objective remains the same: to gain unauthorized access to personal and financial information. The Canada SMS blaster cybercrime case shows how attackers are combining traditional <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/fraud/" target="_blank"  rel="noopener" title="fraud" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27997">fraud</a> tactics with newer tools to scale their operations.
<h3>Public Advisory and Safety Measures</h3>
Police are urging the public to remain cautious when receiving unexpected text messages. Users are advised not to click on suspicious links or share personal information through unsolicited messages.

Officials recommend accessing banking services only through official applications or by directly entering website addresses into browsers. Victims of suspected fraud are encouraged to report incidents to law enforcement.

Deputy Chief Johnson also acknowledged the role of the Toronto Police Coordinated Cyber Centre and partner agencies in handling the investigation. He stressed that staying informed and vigilant remains one of the most effective defenses against such threats.]]></description>
										<content:encoded><![CDATA[<p><img width="1376" height="768" src="https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Canada SMS blaster cybercrime case" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-1140x636.webp 1140w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Canada-SMS-blaster-cybercrime-case-1140x636.webp 1140w" sizes="(max-width: 1376px) 100vw, 1376px" title="Toronto Police Bust Mobile Smishing Network Targeting Thousands 8"></p>A major Canada SMS blaster cybercrime case has come to light as Toronto Police charge three men with 44 offences in what authorities describe as a first-of-its-kind investigation in the country. The case, part of Project Lighthouse, highlights a growing threat where <a href="https://thecyberexpress.com/nation-state-hackers-weaponize-winrar-flaw/" target="_blank" rel="noopener">cybercriminals</a> use mobile technology to target thousands of people at once.

The investigation began in November 2025 after a security partner alerted police to a suspected SMS blaster operating in downtown Toronto. What followed was a months-long probe into a sophisticated operation that combined mobility, deception, and large-scale disruption.
<h3>What Is the Canada SMS Blaster Cybercrime Case?</h3>
At the center of the Canada SMS blaster <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/" target="_blank"  rel="noopener" title="cybercrime" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27996">cybercrime</a> case is a device that mimics a legitimate cellular tower. When nearby <a href="https://thecyberexpress.com/how-to-find-hidden-cameras-using-mobile-phones/" target="_blank" rel="noopener">mobile phones</a> connect to it, users receive fraudulent messages that appear to come from trusted organizations. These messages often include links to fake websites designed to steal sensitive information such as banking credentials and <a href="https://thecyberexpress.com/steps-to-create-unbreakable-passwords/" target="_blank" rel="noopener">passwords</a>.

This method is widely known as “<a href="https://thecyberexpress.com/smishing-and-vishing-in-2025/" target="_blank" rel="noopener">smishing</a>,” a form of phishing carried out through text messages. However, the scale and mobility of the device used in this case set it apart from typical <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyber" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27995">cyber</a> fraud schemes.

Deputy Chief Rob Johnson <a href="https://www.tps.ca/media-centre/stories/unprecedented-sms-blaster-arrests/" target="_blank" rel="nofollow noopener">said</a> the operation posed serious risks beyond financial fraud. He noted that the technology had the capability to reach thousands of devices simultaneously, raising concerns about public safety.
<h3>Large-Scale Disruption Across the Greater Toronto Area</h3>
Investigators found that the SMS blaster was not stationary. It was operated from vehicles, allowing suspects to move across the Greater Toronto Area and deploy the device in multiple locations.

According to Detective Sergeant Lindsay Riddell, tens of thousands of devices connected to the rogue network over several months. Police also recorded more than 13 million network disruptions, during which affected devices were unable to connect to legitimate cellular networks.

These disruptions had serious implications. During those moments, access to emergency services such as 9-1-1 could have been impacted, making the Canada SMS blaster cybercrime case not just a financial threat but also a public safety concern.
<h3>Arrests and Seizure of Devices</h3>
Toronto Police executed search warrants on March 31 at residences in Markham and Hamilton, leading to the arrest of two suspects. Authorities seized multiple SMS blasters along with a significant amount of electronic evidence.

A third individual later turned himself in on April 21. All three now face a combined total of 44 charges linked to the operation.

The Canada SMS blaster cybercrime case involved extensive coordination between multiple agencies, including the Royal Canadian Mounted Police National Cybercrime Coordination Centre, regional police services, financial institutions, and telecom providers. Officials say this collaboration was key to identifying and disrupting the activity.
<h3>A New Type of Cyber Threat in Canada</h3>
Law enforcement officials emphasized that this is the first known case of SMS blaster technology being used in Canada. The case reflects how cyber-enabled crimes are becoming more advanced and harder to detect.

Authorities noted that while the technology is new, the objective remains the same: to gain unauthorized access to personal and financial information. The Canada SMS blaster cybercrime case shows how attackers are combining traditional <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/fraud/" target="_blank"  rel="noopener" title="fraud" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27997">fraud</a> tactics with newer tools to scale their operations.
<h3>Public Advisory and Safety Measures</h3>
Police are urging the public to remain cautious when receiving unexpected text messages. Users are advised not to click on suspicious links or share personal information through unsolicited messages.

Officials recommend accessing banking services only through official applications or by directly entering website addresses into browsers. Victims of suspected fraud are encouraged to report incidents to law enforcement.

Deputy Chief Johnson also acknowledged the role of the Toronto Police Coordinated Cyber Centre and partner agencies in handling the investigation. He stressed that staying informed and vigilant remains one of the most effective defenses against such threats.]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111682</post-id>	</item>
		<item>
		<title>Operation TrustTrap Reveals 16,800 Fake Domains Exploiting User Trust</title>
		<link>https://thecyberexpress.com/operation-trusttrap/</link>
		
		<dc:creator><![CDATA[Ashish Khaitan]]></dc:creator>
		<pubDate>Mon, 27 Apr 2026 11:06:14 +0000</pubDate>
				<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Dark Web News]]></category>
		<category><![CDATA[Alibaba Cloud]]></category>
		<category><![CDATA[Tencent Cloud]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111649</guid>

					<description><![CDATA[<p><img width="1101" height="614" src="https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Operation TrustTrap" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap.png 1101w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-300x167.png 300w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-1024x571.png 1024w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-768x428.png 768w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-600x335.png 600w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-150x84.png 150w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-750x418.png 750w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap.avif 1101w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-300x167.avif 300w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-1024x571.avif 1024w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-768x428.avif 768w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-600x335.avif 600w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-150x84.avif 150w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-750x418.avif 750w" sizes="(max-width: 1101px) 100vw, 1101px" title="Operation TrustTrap Reveals 16,800 Fake Domains Exploiting User Trust 9"></p><div class="text-base my-auto mx-auto [--thread-content-margin:var(--thread-content-margin-xs,calc(var(--spacing)*4))] @w-sm/main:[--thread-content-margin:var(--thread-content-margin-sm,calc(var(--spacing)*6))] @w-lg/main:[--thread-content-margin:var(--thread-content-margin-lg,calc(var(--spacing)*16))] px-(--thread-content-margin)">
<div class="[--thread-content-max-width:40rem] @w-lg/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn">
<div class="flex max-w-full flex-col gap-4 grow">
<div class="min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal outline-none keyboard-focused:focus-ring [.text-message+&amp;]:mt-1" dir="auto" data-message-author-role="assistant" data-message-id="fc12a00f-f0b4-4e9c-8696-1a1e7a9d93b7" data-message-model-slug="gpt-5-3-mini">
<div class="flex w-full flex-col gap-1 empty:hidden">
<div class="markdown prose dark:prose-invert w-full wrap-break-word light markdown-new-styling">
<p data-start="112" data-end="659">In a world where digital threats are becoming more confusing, Cyble Research and Intelligence Labs (CRIL) has uncovered one of the most extensive deceptive domain spoofing campaigns to date.</p>
<p data-start="112" data-end="659">Dubbed Operation TrustTrap, this large-scale operation has leveraged over 16,800 malicious domains to exploit cognitive trust mechanisms and harvest sensitive user data from unsuspecting victims.</p>
<p data-start="112" data-end="659">The scope and scale of this operation reveal a shift in how cybercriminals are evolving their tactics to bypass traditional technical security measures.</p>

<h3 data-start="112" data-end="659">What is Operation TrustTrap</h3>
<p data-start="701" data-end="1222">Since early 2026, <a href="https://cyble.com/blog/operation-trusttrap-domain-spoofing-campaign/" target="_blank" rel="nofollow noopener">CRIL</a> has been tracking a well-coordinated infrastructure involving a massive network of spoofed domains. These domains were designed to mimic legitimate government portals, particularly those related to transportation services like Department of Motor Vehicles (DMV) portals, toll payment systems, and vehicle registration services in the United States. The aim of this campaign is clear: credential and payment card harvesting through the exploitation of trusted government-facing services.</p>
<p data-start="1224" data-end="1608">However, the technical complexity of the attack isn't based on advanced <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-hacking/"   title="hacking" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27994">hacking</a> techniques. Instead, Operation TrustTrap exploits how humans visually interpret URLs. By embedding government-like subdomains, attackers have created fraudulent domains that resemble legitimate government addresses, deceiving individuals into visiting these sites and providing <a href="https://thecyberexpress.com/situsamc-data-breach/" target="_blank" rel="noopener">sensitive information</a>.</p>

<h3 data-section-id="1ybrbf0" data-start="1610" data-end="1673">Tencent Cloud and Alibaba Cloud APAC</h3>
<p data-start="1675" data-end="2001">The spoofed domains were predominantly hosted on Tencent Cloud and Alibaba Cloud APAC, both of which have significant <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27993">data</a> centers in the Asia-Pacific region. These platforms have been linked to the infrastructure of the campaign, and their concentrated use adds another layer of complexity to the attribution process.</p>
<p data-start="2003" data-end="2443">Furthermore, CRIL found that the domains were primarily registered through Gname.com Pte. Ltd., a registrar known for its significant Chinese customer base. Other registrars, such as Dominet (HK) Limited and NameSilo LLC, were also identified in the campaign.</p>
<p data-start="2003" data-end="2443">These domain names were often associated with .bond, .cc, and .cfd top-level domains (TLDs), which were frequently used to <a href="https://thecyberexpress.com/situsamc-data-breach/" target="_blank" rel="noopener">evade detection</a> and blacklisting.</p>

<h3 data-section-id="3cjjwp" data-start="2445" data-end="2493">The Key Technique: Subdomain Trust Injection</h3>
<p data-start="2495" data-end="2901">The most common method used in Operation TrustTrap is subdomain trust injection. This technique involves embedding trusted government tokens, such as mass.gov or wa.gov, in subdomains rather than the root domain. In legitimate URLs, the .gov component typically appears at the end of the domain string, but in these malicious domains, .gov is cleverly placed as part of a subdomain.</p>
<p data-start="2903" data-end="3321">For instance, a URL such as mass.gov-bzyc[.]cc will lead a user to believe they are accessing an official Massachusetts government page, but in reality, they are on a fraudulent site designed to capture personal and financial data.</p>


[caption id="" align="alignnone" width="1024"]<img src="https://cyble.com/wp-content/uploads/2026/04/figure5-1024x768.png" alt="Fake Massachusetts RMV citation landing page" width="1024" height="768" /> Fake Massachusetts RMV citation landing page (Source: Cyble)[/caption]
<p data-start="2903" data-end="3321">This manipulation of the domain’s structure is visually convincing, but it bypasses traditional <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27991">security</a> filters that only check the root domain for trusted indicators like .gov.</p>
<p data-start="3323" data-end="3565">Another obfuscation technique used is hyphen-based semantic manipulation, where hyphens are inserted into familiar government identifiers to create visually similar URLs. This tactic further complicates the detection of <a href="https://thecyberexpress.com/zero-day-patched-in-ios-18-6-2/" target="_blank" rel="noopener">malicious domains</a>.</p>

<h3 data-section-id="4y36vi" data-start="3567" data-end="3606">Global Targeting and Regional Focus</h3>
<p data-start="3608" data-end="3942">While Operation TrustTrap is heavily focused on the United States, targeting state portals such as those in California, Washington, and Florida, the operation is not confined to one region. CRIL identified similar spoofing efforts targeting government portals in India, Vietnam, and the United Kingdom.</p>
<p data-start="3944" data-end="4418">In India, attackers have specifically targeted portals that follow the .gov.in domain structure. By injecting subdomains like <a class="decorated-link cursor-pointer" target="_new" rel="noopener" data-start="4076" data-end="4091">www.in.gov-bond</a>, the attackers were able to replicate the appearance of legitimate government websites, particularly those related to the Indian Department of National Investigation (NIA) and other defense-adjacent sites.</p>

[caption id="" align="alignnone" width="939"]<img src="https://cyble.com/wp-content/uploads/2026/04/figure7.png" alt="APT36 impersonating NIA, India operating at nia[.]gov[.]in[.]in3ymonaq[.]casa" width="939" height="703" /> APT36 impersonating NIA (Source: Cyble)[/caption]
<p data-start="3944" data-end="4418">This specific targeting suggests that the <a class="wpil_keyword_link" href="https://cyble.com/threat-actor/" target="_blank"  rel="noopener" title="threat actor" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27992">threat actor</a> has knowledge of government infrastructure and how it operates.</p>

<h3 data-section-id="1vpy0of" data-start="4420" data-end="4471">APT36 and the Connection to Operation TrustTrap</h3>
<p data-start="4473" data-end="4862">In addition to the use of Tencent Cloud and Alibaba Cloud, the tactics, techniques, and procedures (TTPs) observed in the campaign bear a striking resemblance to those used by <a href="https://cyble.com/threat-actor-profiles/transparenttribe/" target="_blank" rel="nofollow noopener">APT36 (also known as Transparent Tribe)</a>. This Pakistan-based Advanced Persistent Threat (APT) group has a long history of targeting Indian government entities, defense personnel, and diplomatic infrastructure.</p>
<p data-start="4864" data-end="5226">The infrastructure used in Operation TrustTrap shows similarities to APT36’s previous campaigns, particularly in terms of the domain registration patterns and use of Tencent Cloud and Alibaba Cloud APAC infrastructure. Furthermore, the behavior observed, including domain rotation and the use of disposable domains, matches previous APT36 activities.</p>

<h3 data-section-id="11in17k" data-start="5228" data-end="5262">Registrar and Hosting Analysis</h3>
<p data-start="5264" data-end="5615">The dominance of Gname.com as the registrar of choice for over 70% of the spoofed domains points to a specific trend in the campaign’s operational setup. This Singapore-based registrar, which serves a large number of Chinese entities, is part of the broader infrastructure strategy that focuses on low-cost hosting in the Asia-Pacific region.</p>
<p data-start="5617" data-end="5990">Notably, Tencent Cloud and Alibaba Cloud APAC offer cloud services with global reach, providing the necessary infrastructure to scale this type of malicious operation. These services have been instrumental in supporting the rapid deployment of <a href="https://thecyberexpress.com/btmob-rat/" target="_blank" rel="noopener">phishing sites</a> across a variety of government services, especially those involving time-sensitive financial transactions.</p>

</div>
</div>
</div>
</div>
</div>
</div>]]></description>
										<content:encoded><![CDATA[<p><img width="1101" height="614" src="https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Operation TrustTrap" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap.png 1101w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-300x167.png 300w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-1024x571.png 1024w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-768x428.png 768w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-600x335.png 600w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-150x84.png 150w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-750x418.png 750w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap.avif 1101w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-300x167.avif 300w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-1024x571.avif 1024w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-768x428.avif 768w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-600x335.avif 600w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-150x84.avif 150w, https://thecyberexpress.com/wp-content/uploads/Operation-TrustTrap-750x418.avif 750w" sizes="(max-width: 1101px) 100vw, 1101px" title="Operation TrustTrap Reveals 16,800 Fake Domains Exploiting User Trust 12"></p><div class="text-base my-auto mx-auto [--thread-content-margin:var(--thread-content-margin-xs,calc(var(--spacing)*4))] @w-sm/main:[--thread-content-margin:var(--thread-content-margin-sm,calc(var(--spacing)*6))] @w-lg/main:[--thread-content-margin:var(--thread-content-margin-lg,calc(var(--spacing)*16))] px-(--thread-content-margin)">
<div class="[--thread-content-max-width:40rem] @w-lg/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn">
<div class="flex max-w-full flex-col gap-4 grow">
<div class="min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal outline-none keyboard-focused:focus-ring [.text-message+&amp;]:mt-1" dir="auto" data-message-author-role="assistant" data-message-id="fc12a00f-f0b4-4e9c-8696-1a1e7a9d93b7" data-message-model-slug="gpt-5-3-mini">
<div class="flex w-full flex-col gap-1 empty:hidden">
<div class="markdown prose dark:prose-invert w-full wrap-break-word light markdown-new-styling">
<p data-start="112" data-end="659">In a world where digital threats are becoming more confusing, Cyble Research and Intelligence Labs (CRIL) has uncovered one of the most extensive deceptive domain spoofing campaigns to date.</p>
<p data-start="112" data-end="659">Dubbed Operation TrustTrap, this large-scale operation has leveraged over 16,800 malicious domains to exploit cognitive trust mechanisms and harvest sensitive user data from unsuspecting victims.</p>
<p data-start="112" data-end="659">The scope and scale of this operation reveal a shift in how cybercriminals are evolving their tactics to bypass traditional technical security measures.</p>

<h3 data-start="112" data-end="659">What is Operation TrustTrap</h3>
<p data-start="701" data-end="1222">Since early 2026, <a href="https://cyble.com/blog/operation-trusttrap-domain-spoofing-campaign/" target="_blank" rel="nofollow noopener">CRIL</a> has been tracking a well-coordinated infrastructure involving a massive network of spoofed domains. These domains were designed to mimic legitimate government portals, particularly those related to transportation services like Department of Motor Vehicles (DMV) portals, toll payment systems, and vehicle registration services in the United States. The aim of this campaign is clear: credential and payment card harvesting through the exploitation of trusted government-facing services.</p>
<p data-start="1224" data-end="1608">However, the technical complexity of the attack isn't based on advanced <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-hacking/"   title="hacking" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27994">hacking</a> techniques. Instead, Operation TrustTrap exploits how humans visually interpret URLs. By embedding government-like subdomains, attackers have created fraudulent domains that resemble legitimate government addresses, deceiving individuals into visiting these sites and providing <a href="https://thecyberexpress.com/situsamc-data-breach/" target="_blank" rel="noopener">sensitive information</a>.</p>

<h3 data-section-id="1ybrbf0" data-start="1610" data-end="1673">Tencent Cloud and Alibaba Cloud APAC</h3>
<p data-start="1675" data-end="2001">The spoofed domains were predominantly hosted on Tencent Cloud and Alibaba Cloud APAC, both of which have significant <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27993">data</a> centers in the Asia-Pacific region. These platforms have been linked to the infrastructure of the campaign, and their concentrated use adds another layer of complexity to the attribution process.</p>
<p data-start="2003" data-end="2443">Furthermore, CRIL found that the domains were primarily registered through Gname.com Pte. Ltd., a registrar known for its significant Chinese customer base. Other registrars, such as Dominet (HK) Limited and NameSilo LLC, were also identified in the campaign.</p>
<p data-start="2003" data-end="2443">These domain names were often associated with .bond, .cc, and .cfd top-level domains (TLDs), which were frequently used to <a href="https://thecyberexpress.com/situsamc-data-breach/" target="_blank" rel="noopener">evade detection</a> and blacklisting.</p>

<h3 data-section-id="3cjjwp" data-start="2445" data-end="2493">The Key Technique: Subdomain Trust Injection</h3>
<p data-start="2495" data-end="2901">The most common method used in Operation TrustTrap is subdomain trust injection. This technique involves embedding trusted government tokens, such as mass.gov or wa.gov, in subdomains rather than the root domain. In legitimate URLs, the .gov component typically appears at the end of the domain string, but in these malicious domains, .gov is cleverly placed as part of a subdomain.</p>
<p data-start="2903" data-end="3321">For instance, a URL such as mass.gov-bzyc[.]cc will lead a user to believe they are accessing an official Massachusetts government page, but in reality, they are on a fraudulent site designed to capture personal and financial data.</p>


[caption id="" align="alignnone" width="1024"]<img src="https://cyble.com/wp-content/uploads/2026/04/figure5-1024x768.png" alt="Fake Massachusetts RMV citation landing page" width="1024" height="768" /> Fake Massachusetts RMV citation landing page (Source: Cyble)[/caption]
<p data-start="2903" data-end="3321">This manipulation of the domain’s structure is visually convincing, but it bypasses traditional <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27991">security</a> filters that only check the root domain for trusted indicators like .gov.</p>
<p data-start="3323" data-end="3565">Another obfuscation technique used is hyphen-based semantic manipulation, where hyphens are inserted into familiar government identifiers to create visually similar URLs. This tactic further complicates the detection of <a href="https://thecyberexpress.com/zero-day-patched-in-ios-18-6-2/" target="_blank" rel="noopener">malicious domains</a>.</p>

<h3 data-section-id="4y36vi" data-start="3567" data-end="3606">Global Targeting and Regional Focus</h3>
<p data-start="3608" data-end="3942">While Operation TrustTrap is heavily focused on the United States, targeting state portals such as those in California, Washington, and Florida, the operation is not confined to one region. CRIL identified similar spoofing efforts targeting government portals in India, Vietnam, and the United Kingdom.</p>
<p data-start="3944" data-end="4418">In India, attackers have specifically targeted portals that follow the .gov.in domain structure. By injecting subdomains like <a class="decorated-link cursor-pointer" target="_new" rel="noopener" data-start="4076" data-end="4091">www.in.gov-bond</a>, the attackers were able to replicate the appearance of legitimate government websites, particularly those related to the Indian Department of National Investigation (NIA) and other defense-adjacent sites.</p>

[caption id="" align="alignnone" width="939"]<img src="https://cyble.com/wp-content/uploads/2026/04/figure7.png" alt="APT36 impersonating NIA, India operating at nia[.]gov[.]in[.]in3ymonaq[.]casa" width="939" height="703" /> APT36 impersonating NIA (Source: Cyble)[/caption]
<p data-start="3944" data-end="4418">This specific targeting suggests that the <a class="wpil_keyword_link" href="https://cyble.com/threat-actor/" target="_blank"  rel="noopener" title="threat actor" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27992">threat actor</a> has knowledge of government infrastructure and how it operates.</p>

<h3 data-section-id="1vpy0of" data-start="4420" data-end="4471">APT36 and the Connection to Operation TrustTrap</h3>
<p data-start="4473" data-end="4862">In addition to the use of Tencent Cloud and Alibaba Cloud, the tactics, techniques, and procedures (TTPs) observed in the campaign bear a striking resemblance to those used by <a href="https://cyble.com/threat-actor-profiles/transparenttribe/" target="_blank" rel="nofollow noopener">APT36 (also known as Transparent Tribe)</a>. This Pakistan-based Advanced Persistent Threat (APT) group has a long history of targeting Indian government entities, defense personnel, and diplomatic infrastructure.</p>
<p data-start="4864" data-end="5226">The infrastructure used in Operation TrustTrap shows similarities to APT36’s previous campaigns, particularly in terms of the domain registration patterns and use of Tencent Cloud and Alibaba Cloud APAC infrastructure. Furthermore, the behavior observed, including domain rotation and the use of disposable domains, matches previous APT36 activities.</p>

<h3 data-section-id="11in17k" data-start="5228" data-end="5262">Registrar and Hosting Analysis</h3>
<p data-start="5264" data-end="5615">The dominance of Gname.com as the registrar of choice for over 70% of the spoofed domains points to a specific trend in the campaign’s operational setup. This Singapore-based registrar, which serves a large number of Chinese entities, is part of the broader infrastructure strategy that focuses on low-cost hosting in the Asia-Pacific region.</p>
<p data-start="5617" data-end="5990">Notably, Tencent Cloud and Alibaba Cloud APAC offer cloud services with global reach, providing the necessary infrastructure to scale this type of malicious operation. These services have been instrumental in supporting the rapid deployment of <a href="https://thecyberexpress.com/btmob-rat/" target="_blank" rel="noopener">phishing sites</a> across a variety of government services, especially those involving time-sensitive financial transactions.</p>

</div>
</div>
</div>
</div>
</div>
</div>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111649</post-id>	</item>
		<item>
		<title>Litecoin Hit by Zero-Day Vulnerability, Triggers 13-Block Reorganization</title>
		<link>https://thecyberexpress.com/litecoin-network-zero-day-bug/</link>
		
		<dc:creator><![CDATA[Ashish Khaitan]]></dc:creator>
		<pubDate>Mon, 27 Apr 2026 11:01:55 +0000</pubDate>
				<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[Vulnerability News]]></category>
		<category><![CDATA[DoS]]></category>
		<category><![CDATA[Litecoin Network]]></category>
		<category><![CDATA[MWEB]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Zero Day]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111672</guid>

					<description><![CDATA[<p><img width="1101" height="614" src="https://thecyberexpress.com/wp-content/uploads/Litecoin-Network.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Litecoin Network" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Litecoin-Network.webp 1101w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-750x418.webp 750w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network.webp 1101w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-750x418.webp 750w" sizes="(max-width: 1101px) 100vw, 1101px" title="Litecoin Hit by Zero-Day Vulnerability, Triggers 13-Block Reorganization 13"></p><span data-contrast="auto">The Litecoin network faced a security breach when a zero-day vulnerability triggered a 13-block reorganization, impacting several major mining pools. This disruption led to a temporary halt in transaction finality, drawing attention to the potential risks within the Litecoin ecosystem. </span>

<span data-contrast="auto">The Litecoin team quickly confirmed the bug on their official X account and assured the community that a patch had been fully deployed to resolve the issue.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:279}"> </span>
<h3 aria-level="3"><b><span data-contrast="none">The Zero-Day Bug and Its Impact on the Litecoin Network</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}"> </span></h3>
<span data-contrast="auto">A zero-day <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/vulnerabilities/"   title="vulnerability" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27990">vulnerability</a> refers to a flaw that is unknown to the developers at the time of its exploitation. In this case, the bug targeted the handling of MimbleWimble Extension Block (MWEB) transactions, a <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-privacy/"   title="privacy" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27986">privacy</a> feature on the Litecoin network. The vulnerability allowed an attacker to exploit the network by triggering a <a href="https://thecyberexpress.com/ebay-outage-april-2026-ddos-attack/" target="_blank" rel="noopener">Denial-of-Service (DoS) attack</a>, flooding the network with invalid MWEB transactions.</span>

<span data-contrast="auto">MWEB transactions are designed to offer enhanced privacy for Litecoin users by obscuring transaction details. However, due to the zero-day bug, some Litecoin nodes that had not updated their software accepted invalid MWEB transactions, violating the network’s consensus rules.</span>

<span data-contrast="auto">As a result, a block reorganization (or “reorg”) took place when a competing chain of blocks replaced the existing chain, causing 13 blocks to be reorganized. A block reorg of this magnitude is a rare event and presents significant challenges, including the potential for double-spending and undermined user confidence.</span>
<h3 aria-level="3"><b><span data-contrast="none">Understanding the Denial-of-Service Attack and Its Impact on Miners</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}"> </span></h3>
<span data-contrast="auto">The </span><a href="https://www.mexc.co/en-IN/news/1055251" target="_blank" rel="nofollow noopener"><span data-contrast="none">core target of the attack was the mining pools</span></a><span data-contrast="auto">, which play a critical role in securing the Litecoin network. Mining pools are groups of miners who pool their computational power to increase their chances of successfully finding a block. By launching a DoS attack, the attacker aimed to disrupt the mining process by overwhelming the network with invalid transactions.</span>

<span data-contrast="auto">The impact on miners was particularly severe. Mining pools that failed to update their nodes were unable to process valid blocks during the attack. This resulted in temporary downtime for these pools, contributing to a short-term drop in the network’s hashrate. While the Litecoin network quickly recovered, the event highlighted the vulnerability of <a href="https://thecyberexpress.com/miningdropper-android-malware/" target="_blank" rel="noopener">mining</a> operations when software updates are delayed or ignored.</span>
<h3 aria-level="3"><b><span data-contrast="none">Quick Response and Deployment of the Patch</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}"> </span></h3>
<span data-contrast="auto">Despite the severity of the incident, the Litecoin team responded promptly. Within hours, the development team confirmed the bug and rolled out a patch that effectively closed the attack vector. The patch prevented nodes from accepting invalid MWEB transactions, thus <a href="https://thecyberexpress.com/poland-cyberattack-energy-grid-blackout/" target="_blank" rel="noopener">stabilizing the network</a> and mitigating further risks. The team urged all node operators to update their software immediately to ensure the <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27988">security</a> of their operations.</span>

<span data-contrast="auto">Importantly, the Litecoin team confirmed that no funds were lost as a result of the reorganization. While users’ transactions that were part of the reorganized blocks were reversed, the overall integrity of the network remained intact. The incident, although disruptive, demonstrated the resilience and quick action of the Litecoin team.</span>
<h3 aria-level="3"><b><span data-contrast="none">The Role of MWEB and Zero-Day Bugs</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}"> </span></h3>
<span data-contrast="auto">Launched in 2011, Litecoin has earned a reputation as one of the oldest and most stable <a href="https://thecyberexpress.com/hitbtc-exchange-critical-security-warning/" target="_blank" rel="noopener">cryptocurrencies</a>. As a fork of Bitcoin, it relies on a proof-of-work consensus mechanism to validate transactions. Over the years, Litecoin has faced relatively few security incidents, but the April 25 event serves as a stark reminder that even established networks are susceptible to <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/"   title="vulnerabilities" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27987">vulnerabilities</a>.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The introduction of MWEB in 2022 marked a significant upgrade for Litecoin, providing users with enhanced privacy features. However, as seen with this recent zero-day vulnerability, new features can also introduce unforeseen <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risks" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27989">risks</a>. </span>]]></description>
										<content:encoded><![CDATA[<p><img width="1101" height="614" src="https://thecyberexpress.com/wp-content/uploads/Litecoin-Network.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Litecoin Network" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Litecoin-Network.webp 1101w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-750x418.webp 750w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network.webp 1101w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-1024x571.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-768x428.webp 768w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Litecoin-Network-750x418.webp 750w" sizes="(max-width: 1101px) 100vw, 1101px" title="Litecoin Hit by Zero-Day Vulnerability, Triggers 13-Block Reorganization 14"></p><span data-contrast="auto">The Litecoin network faced a security breach when a zero-day vulnerability triggered a 13-block reorganization, impacting several major mining pools. This disruption led to a temporary halt in transaction finality, drawing attention to the potential risks within the Litecoin ecosystem. </span>

<span data-contrast="auto">The Litecoin team quickly confirmed the bug on their official X account and assured the community that a patch had been fully deployed to resolve the issue.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:279}"> </span>
<h3 aria-level="3"><b><span data-contrast="none">The Zero-Day Bug and Its Impact on the Litecoin Network</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}"> </span></h3>
<span data-contrast="auto">A zero-day <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/vulnerabilities/"   title="vulnerability" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27990">vulnerability</a> refers to a flaw that is unknown to the developers at the time of its exploitation. In this case, the bug targeted the handling of MimbleWimble Extension Block (MWEB) transactions, a <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-privacy/"   title="privacy" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27986">privacy</a> feature on the Litecoin network. The vulnerability allowed an attacker to exploit the network by triggering a <a href="https://thecyberexpress.com/ebay-outage-april-2026-ddos-attack/" target="_blank" rel="noopener">Denial-of-Service (DoS) attack</a>, flooding the network with invalid MWEB transactions.</span>

<span data-contrast="auto">MWEB transactions are designed to offer enhanced privacy for Litecoin users by obscuring transaction details. However, due to the zero-day bug, some Litecoin nodes that had not updated their software accepted invalid MWEB transactions, violating the network’s consensus rules.</span>

<span data-contrast="auto">As a result, a block reorganization (or “reorg”) took place when a competing chain of blocks replaced the existing chain, causing 13 blocks to be reorganized. A block reorg of this magnitude is a rare event and presents significant challenges, including the potential for double-spending and undermined user confidence.</span>
<h3 aria-level="3"><b><span data-contrast="none">Understanding the Denial-of-Service Attack and Its Impact on Miners</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}"> </span></h3>
<span data-contrast="auto">The </span><a href="https://www.mexc.co/en-IN/news/1055251" target="_blank" rel="nofollow noopener"><span data-contrast="none">core target of the attack was the mining pools</span></a><span data-contrast="auto">, which play a critical role in securing the Litecoin network. Mining pools are groups of miners who pool their computational power to increase their chances of successfully finding a block. By launching a DoS attack, the attacker aimed to disrupt the mining process by overwhelming the network with invalid transactions.</span>

<span data-contrast="auto">The impact on miners was particularly severe. Mining pools that failed to update their nodes were unable to process valid blocks during the attack. This resulted in temporary downtime for these pools, contributing to a short-term drop in the network’s hashrate. While the Litecoin network quickly recovered, the event highlighted the vulnerability of <a href="https://thecyberexpress.com/miningdropper-android-malware/" target="_blank" rel="noopener">mining</a> operations when software updates are delayed or ignored.</span>
<h3 aria-level="3"><b><span data-contrast="none">Quick Response and Deployment of the Patch</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}"> </span></h3>
<span data-contrast="auto">Despite the severity of the incident, the Litecoin team responded promptly. Within hours, the development team confirmed the bug and rolled out a patch that effectively closed the attack vector. The patch prevented nodes from accepting invalid MWEB transactions, thus <a href="https://thecyberexpress.com/poland-cyberattack-energy-grid-blackout/" target="_blank" rel="noopener">stabilizing the network</a> and mitigating further risks. The team urged all node operators to update their software immediately to ensure the <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27988">security</a> of their operations.</span>

<span data-contrast="auto">Importantly, the Litecoin team confirmed that no funds were lost as a result of the reorganization. While users’ transactions that were part of the reorganized blocks were reversed, the overall integrity of the network remained intact. The incident, although disruptive, demonstrated the resilience and quick action of the Litecoin team.</span>
<h3 aria-level="3"><b><span data-contrast="none">The Role of MWEB and Zero-Day Bugs</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}"> </span></h3>
<span data-contrast="auto">Launched in 2011, Litecoin has earned a reputation as one of the oldest and most stable <a href="https://thecyberexpress.com/hitbtc-exchange-critical-security-warning/" target="_blank" rel="noopener">cryptocurrencies</a>. As a fork of Bitcoin, it relies on a proof-of-work consensus mechanism to validate transactions. Over the years, Litecoin has faced relatively few security incidents, but the April 25 event serves as a stark reminder that even established networks are susceptible to <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/"   title="vulnerabilities" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27987">vulnerabilities</a>.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The introduction of MWEB in 2022 marked a significant upgrade for Litecoin, providing users with enhanced privacy features. However, as seen with this recent zero-day vulnerability, new features can also introduce unforeseen <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risks" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27989">risks</a>. </span>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111672</post-id>	</item>
		<item>
		<title>eBay Struggles with Widespread Outage, Disrupting Transactions and API Access</title>
		<link>https://thecyberexpress.com/ebay-outage-april-2026-ddos-attack/</link>
		
		<dc:creator><![CDATA[Ashish Khaitan]]></dc:creator>
		<pubDate>Mon, 27 Apr 2026 10:04:00 +0000</pubDate>
				<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[DDoS Attacks News]]></category>
		<category><![CDATA[Threat Actors]]></category>
		<category><![CDATA[313 Team]]></category>
		<category><![CDATA[API]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[eBay Outage]]></category>
		<category><![CDATA[hacktivist group]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111661</guid>

					<description><![CDATA[<p><img width="1217" height="720" src="https://thecyberexpress.com/wp-content/uploads/eBay-Outage.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="eBay Outage" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/eBay-Outage.webp 1217w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-300x177.webp 300w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-1024x606.webp 1024w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-768x454.webp 768w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-600x355.webp 600w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-150x89.webp 150w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-750x444.webp 750w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-1140x674.webp 1140w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage.webp 1217w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-300x177.webp 300w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-1024x606.webp 1024w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-768x454.webp 768w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-600x355.webp 600w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-150x89.webp 150w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-750x444.webp 750w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-1140x674.webp 1140w" sizes="(max-width: 1217px) 100vw, 1217px" title="eBay Struggles with Widespread Outage, Disrupting Transactions and API Access 15"></p><span data-contrast="auto">The e-commerce platform eBay, a giant in online auctions and fixed-price listings, faced widespread disruptions beginning late Sunday, April 26, 2026, extending into Monday, as users across the globe reported severe technical issues. The eBay outage, which has crippled essential features of the site, particularly the API, has left many buyers and sellers frustrated, struggling to access critical functions, including search features, listings, and checkout processes.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">As users faced slow page loads, failed transactions, and difficulty completing sales, a series of unverified reports surfaced suggesting that the hacktivist group 313 Team was behind the massive denial-of-service (<a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-ddos-attack/" target="_blank"  rel="noopener" title="DDoS" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27984">DDoS</a>) attack, claiming responsibility for the outage. While the true cause remains unconfirmed by eBay, the timing and scale of the disruption have fueled speculation that a <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyberattack" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27985">cyberattack</a> was involved.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">The Scope of the eBay Outage</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">The eBay outage first began to affect eBay users on the afternoon of April 26, when they began reporting issues with the platform’s functionality. According to <a href="https://downdetector.com/status/ebay/" target="_blank" rel="nofollow noopener">Downdetector</a>, a popular service that tracks online outages, the spike in complaints reached around 3:30 PM ET, with the situation worsening the evening. As of 10:30 PM ET, more than 1,300 outage reports were logged, although the number eventually decreased to about 600 by 11:50 PM ET.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Users complained that essential functions like search were malfunctioning, and pages were loading extremely slowly. "I can't even search for anything or complete a purchase," one frustrated user posted on social media. Others echoed similar concerns, noting that critical transactions were unable to be completed, with error messages preventing them from checking out.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Sellers also voiced their frustrations, noting that they could not access the API, which is crucial for the functioning of third-party tools used to manage listings, inventory, and sales. "It’s been nearly 6 hours since the API went down, and we have no word from support," one seller wrote, emphasizing the financial impact of the outage.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Social Media Users Complain About the Outage</span></b></h3>
<span data-contrast="auto">While eBay has not officially confirmed the cause of the outage, rumors quickly began circulating on <a href="https://thecyberexpress.com/australia-social-media-ban-faces-question/" target="_blank" rel="noopener">social media</a> that the hacktivist group 313 Team was responsible for a DDoS attack targeting the platform. DDoS attacks, which flood a website with traffic to overwhelm its servers and take it offline, have become a frequent tactic for hacktivist groups in recent years.</span>

<span data-contrast="auto">The group, which has previously targeted high-profile organizations, allegedly posted a claim on various forums, taking credit for the disruption. However, this attribution has not been independently verified, and eBay has not provided details about the nature of the attack. The company’s official status page displayed no alerts of a cyberattack, showing only minor updates on the system’s functionality.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Despite these official updates, the community’s response has been vocal, with many users continuing to report issues well into the night. One individual posted, "It’s not just down for me, it’s down for everyone. Is this part of a bigger attack targeting e-commerce sites?"</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">With eBay’s customer support channels largely silent or offering only generic responses, users took to social media to express their frustration. The company’s Instagram account, where many users had previously reached out for help, quickly became a forum for complaints. One commenter wrote, “Brooo you’re down—come on, get up! I need to pay for an auction.” Others left similar messages, questioning the reliability of the platform and demanding answers.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>]]></description>
										<content:encoded><![CDATA[<p><img width="1217" height="720" src="https://thecyberexpress.com/wp-content/uploads/eBay-Outage.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="eBay Outage" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/eBay-Outage.webp 1217w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-300x177.webp 300w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-1024x606.webp 1024w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-768x454.webp 768w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-600x355.webp 600w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-150x89.webp 150w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-750x444.webp 750w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-1140x674.webp 1140w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage.webp 1217w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-300x177.webp 300w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-1024x606.webp 1024w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-768x454.webp 768w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-600x355.webp 600w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-150x89.webp 150w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-750x444.webp 750w, https://thecyberexpress.com/wp-content/uploads/eBay-Outage-1140x674.webp 1140w" sizes="(max-width: 1217px) 100vw, 1217px" title="eBay Struggles with Widespread Outage, Disrupting Transactions and API Access 16"></p><span data-contrast="auto">The e-commerce platform eBay, a giant in online auctions and fixed-price listings, faced widespread disruptions beginning late Sunday, April 26, 2026, extending into Monday, as users across the globe reported severe technical issues. The eBay outage, which has crippled essential features of the site, particularly the API, has left many buyers and sellers frustrated, struggling to access critical functions, including search features, listings, and checkout processes.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">As users faced slow page loads, failed transactions, and difficulty completing sales, a series of unverified reports surfaced suggesting that the hacktivist group 313 Team was behind the massive denial-of-service (<a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-ddos-attack/" target="_blank"  rel="noopener" title="DDoS" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27984">DDoS</a>) attack, claiming responsibility for the outage. While the true cause remains unconfirmed by eBay, the timing and scale of the disruption have fueled speculation that a <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyberattack" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27985">cyberattack</a> was involved.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">The Scope of the eBay Outage</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">The eBay outage first began to affect eBay users on the afternoon of April 26, when they began reporting issues with the platform’s functionality. According to <a href="https://downdetector.com/status/ebay/" target="_blank" rel="nofollow noopener">Downdetector</a>, a popular service that tracks online outages, the spike in complaints reached around 3:30 PM ET, with the situation worsening the evening. As of 10:30 PM ET, more than 1,300 outage reports were logged, although the number eventually decreased to about 600 by 11:50 PM ET.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Users complained that essential functions like search were malfunctioning, and pages were loading extremely slowly. "I can't even search for anything or complete a purchase," one frustrated user posted on social media. Others echoed similar concerns, noting that critical transactions were unable to be completed, with error messages preventing them from checking out.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Sellers also voiced their frustrations, noting that they could not access the API, which is crucial for the functioning of third-party tools used to manage listings, inventory, and sales. "It’s been nearly 6 hours since the API went down, and we have no word from support," one seller wrote, emphasizing the financial impact of the outage.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Social Media Users Complain About the Outage</span></b></h3>
<span data-contrast="auto">While eBay has not officially confirmed the cause of the outage, rumors quickly began circulating on <a href="https://thecyberexpress.com/australia-social-media-ban-faces-question/" target="_blank" rel="noopener">social media</a> that the hacktivist group 313 Team was responsible for a DDoS attack targeting the platform. DDoS attacks, which flood a website with traffic to overwhelm its servers and take it offline, have become a frequent tactic for hacktivist groups in recent years.</span>

<span data-contrast="auto">The group, which has previously targeted high-profile organizations, allegedly posted a claim on various forums, taking credit for the disruption. However, this attribution has not been independently verified, and eBay has not provided details about the nature of the attack. The company’s official status page displayed no alerts of a cyberattack, showing only minor updates on the system’s functionality.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Despite these official updates, the community’s response has been vocal, with many users continuing to report issues well into the night. One individual posted, "It’s not just down for me, it’s down for everyone. Is this part of a bigger attack targeting e-commerce sites?"</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">With eBay’s customer support channels largely silent or offering only generic responses, users took to social media to express their frustration. The company’s Instagram account, where many users had previously reached out for help, quickly became a forum for complaints. One commenter wrote, “Brooo you’re down—come on, get up! I need to pay for an auction.” Others left similar messages, questioning the reliability of the platform and demanding answers.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111661</post-id>	</item>
		<item>
		<title>Norway to Introduce Social Media Age Limit of 16, Platforms to Enforce Verification</title>
		<link>https://thecyberexpress.com/norway-social-media-age-limit-bill-moves-ahead/</link>
		
		<dc:creator><![CDATA[Samiksha Jain]]></dc:creator>
		<pubDate>Mon, 27 Apr 2026 10:02:13 +0000</pubDate>
				<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Policy Updates]]></category>
		<category><![CDATA[children’s mental health]]></category>
		<category><![CDATA[Norway]]></category>
		<category><![CDATA[Norway social media age limit]]></category>
		<category><![CDATA[Prime Minister Jonas Gahr Støre]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111659</guid>

					<description><![CDATA[<p><img width="1376" height="768" src="https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Norway social media age limit" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-1140x636.webp 1140w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-1140x636.webp 1140w" sizes="(max-width: 1376px) 100vw, 1376px" title="Norway to Introduce Social Media Age Limit of 16, Platforms to Enforce Verification 17"></p>The Norway social media age limit is moving closer to becoming law, with the government confirming it will introduce legislation this year to restrict access for children under 16. The proposal, expected to be presented to Parliament (Stortinget), aims to reshape how young users interact with digital platforms and place greater responsibility on technology companies for enforcing age restrictions.

Prime Minister Jonas Gahr Støre said the move is designed to protect childhood experiences from being dominated by screens and algorithms.

He emphasized that children should have space for play, friendships, and offline development, positioning the Norway social media age limit as a safeguard rather than a restriction.
<h3><strong>How the Norway Social Media Age Limit Will Work</strong></h3>
Under the proposed law, the Norway social media age limit will apply from January 1 of the year a child turns 16. This means access will be granted based on birth year rather than exact birthdate, ensuring that entire school cohorts are treated equally. In practice, most children will be at least 15 years old when they gain access.

Minister for Children and Families Lene Vågslid explained that this approach addresses concerns raised during public consultations. Many respondents argued that differences based on birthdates could create social divides among peers. By aligning access with school cohorts, the government aims to balance protection with inclusion.

“For me, it is important both to give better protection for children in the digital world and to listen to what young people are saying. I understand that social media can be an important social arena. We want to ensure inclusion and a sense of community. That is why we are proposing that the cutoff be based on the year of birth rather than the exact birth date, so that cohorts are given equal opportunities, regardless of when each person is born,” <a href="https://www.regjeringen.no/en/whats-new/norwegian-social-media-age-restrictions-law-on-track-to-be-introduced-this-year-this-is-how-the-age-limit-for-social-media-will-work/id3157276/" target="_blank" rel="nofollow noopener">said</a> Minister for Children and Families Lene Vågslid (Labour).

At the same time, officials acknowledge that social media plays a role in young people’s social lives. The policy attempts to maintain that balance while reducing early exposure to potential harms linked to excessive screen time and online interactions.
<h3><strong>Tech Companies to Enforce the Norway Social Media Age Limit</strong></h3>
A key feature of the Norway social media age limit is the shift in responsibility to technology companies. Platforms will be required to implement effective age verification systems at login, ensuring that underage users cannot bypass restrictions.

Minister of Digitalisation and Public Governance Karianne Tung made it clear that enforcement will not rely on children or parents alone. She stated that companies must take full responsibility for compliance and ensure that safeguards are operational from the first day the law takes effect.

“I expect technology companies to ensure that the age limit is respected. Children cannot be left with the responsibility for staying away from platforms they are not allowed to use. That responsibility rests with the companies providing these services. They must implement effective age verification and comply with the law from day one,” said Minister of Digitalisation and Public Governance Karianne Tung (Labour).

This approach aligns with broader European regulatory trends, particularly the <a href="https://thecyberexpress.com/breton-vs-musk-over-dsa-violation/" target="_blank" rel="noopener">Digital Services Act</a>, which is expected to require platforms to take stronger accountability for user safety, including age verification measures.
<h3><strong>Part of a Wider European Push</strong></h3>
Norway is among the first countries in Europe to move forward with a nationwide <a href="https://thecyberexpress.com/eu-age-verification-app/" target="_blank" rel="noopener">social media restriction</a> of this kind. However, it is not acting in isolation. Several European governments are exploring or advancing similar policies.

In France, lawmakers have already backed a <a href="https://thecyberexpress.com/social-media-ban-for-children-france/" target="_blank" rel="noopener">proposal to restrict social media</a> use for children under 15, with strong support from President Emmanuel Macron. Spain has also <a href="https://thecyberexpress.com/spain-ban-social-media-platforms-kids/" target="_blank" rel="noopener">announced</a> plans to block access for users aged 15 and under, while the Netherlands is considering a minimum age of 15.

In the United Kingdom, Prime Minister Keir Starmer has <a href="https://thecyberexpress.com/uk-government-social-media-ban-for-children/" target="_blank" rel="noopener">supported tighter controls</a>, with pilot programs underway to assess the impact of limiting social media use among teenagers.

These developments suggest that the Norway social media age limit is part of a broader shift across Europe toward stricter regulation of digital platforms and greater protection for minors.
<h3><strong>Implementation Timeline and Next Steps</strong></h3>
The Norwegian government plans to send the proposed legislation for consultation within the European Economic Area before the summer. This process typically lasts around three months. Full enforcement of the Norway social media age limit is expected once the Digital Services Act is incorporated into Norwegian law.

Officials say recent trends support the move. <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="Data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27983">Data</a> indicates a decline in the number of children owning smartphones and using social media, partly due to national screen-time guidelines and initiatives such as mobile-free schools.

The government intends to implement the policy in stages, but it has made clear that service providers are expected to begin compliance preparations immediately.
<h3><strong>A Shift in Digital Policy</strong></h3>
The Norway social media age limit reflects growing concern among policymakers about the impact of digital platforms on<a href="https://thecyberexpress.com/google-gemini-ai-for-kids/" target="_blank" rel="noopener"> children’s mental health</a>, privacy, and development. By placing legal responsibility on technology companies and aligning with European regulation, Norway is positioning itself at the forefront of this policy shift.

As similar measures gain traction across Europe, the effectiveness of age verification and enforcement will be closely watched.

The Norwegian model could become a reference point for other countries seeking to balance digital access with child protection.]]></description>
										<content:encoded><![CDATA[<p><img width="1376" height="768" src="https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Norway social media age limit" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-1140x636.webp 1140w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Norway-social-media-age-limit-1140x636.webp 1140w" sizes="(max-width: 1376px) 100vw, 1376px" title="Norway to Introduce Social Media Age Limit of 16, Platforms to Enforce Verification 18"></p>The Norway social media age limit is moving closer to becoming law, with the government confirming it will introduce legislation this year to restrict access for children under 16. The proposal, expected to be presented to Parliament (Stortinget), aims to reshape how young users interact with digital platforms and place greater responsibility on technology companies for enforcing age restrictions.

Prime Minister Jonas Gahr Støre said the move is designed to protect childhood experiences from being dominated by screens and algorithms.

He emphasized that children should have space for play, friendships, and offline development, positioning the Norway social media age limit as a safeguard rather than a restriction.
<h3><strong>How the Norway Social Media Age Limit Will Work</strong></h3>
Under the proposed law, the Norway social media age limit will apply from January 1 of the year a child turns 16. This means access will be granted based on birth year rather than exact birthdate, ensuring that entire school cohorts are treated equally. In practice, most children will be at least 15 years old when they gain access.

Minister for Children and Families Lene Vågslid explained that this approach addresses concerns raised during public consultations. Many respondents argued that differences based on birthdates could create social divides among peers. By aligning access with school cohorts, the government aims to balance protection with inclusion.

“For me, it is important both to give better protection for children in the digital world and to listen to what young people are saying. I understand that social media can be an important social arena. We want to ensure inclusion and a sense of community. That is why we are proposing that the cutoff be based on the year of birth rather than the exact birth date, so that cohorts are given equal opportunities, regardless of when each person is born,” <a href="https://www.regjeringen.no/en/whats-new/norwegian-social-media-age-restrictions-law-on-track-to-be-introduced-this-year-this-is-how-the-age-limit-for-social-media-will-work/id3157276/" target="_blank" rel="nofollow noopener">said</a> Minister for Children and Families Lene Vågslid (Labour).

At the same time, officials acknowledge that social media plays a role in young people’s social lives. The policy attempts to maintain that balance while reducing early exposure to potential harms linked to excessive screen time and online interactions.
<h3><strong>Tech Companies to Enforce the Norway Social Media Age Limit</strong></h3>
A key feature of the Norway social media age limit is the shift in responsibility to technology companies. Platforms will be required to implement effective age verification systems at login, ensuring that underage users cannot bypass restrictions.

Minister of Digitalisation and Public Governance Karianne Tung made it clear that enforcement will not rely on children or parents alone. She stated that companies must take full responsibility for compliance and ensure that safeguards are operational from the first day the law takes effect.

“I expect technology companies to ensure that the age limit is respected. Children cannot be left with the responsibility for staying away from platforms they are not allowed to use. That responsibility rests with the companies providing these services. They must implement effective age verification and comply with the law from day one,” said Minister of Digitalisation and Public Governance Karianne Tung (Labour).

This approach aligns with broader European regulatory trends, particularly the <a href="https://thecyberexpress.com/breton-vs-musk-over-dsa-violation/" target="_blank" rel="noopener">Digital Services Act</a>, which is expected to require platforms to take stronger accountability for user safety, including age verification measures.
<h3><strong>Part of a Wider European Push</strong></h3>
Norway is among the first countries in Europe to move forward with a nationwide <a href="https://thecyberexpress.com/eu-age-verification-app/" target="_blank" rel="noopener">social media restriction</a> of this kind. However, it is not acting in isolation. Several European governments are exploring or advancing similar policies.

In France, lawmakers have already backed a <a href="https://thecyberexpress.com/social-media-ban-for-children-france/" target="_blank" rel="noopener">proposal to restrict social media</a> use for children under 15, with strong support from President Emmanuel Macron. Spain has also <a href="https://thecyberexpress.com/spain-ban-social-media-platforms-kids/" target="_blank" rel="noopener">announced</a> plans to block access for users aged 15 and under, while the Netherlands is considering a minimum age of 15.

In the United Kingdom, Prime Minister Keir Starmer has <a href="https://thecyberexpress.com/uk-government-social-media-ban-for-children/" target="_blank" rel="noopener">supported tighter controls</a>, with pilot programs underway to assess the impact of limiting social media use among teenagers.

These developments suggest that the Norway social media age limit is part of a broader shift across Europe toward stricter regulation of digital platforms and greater protection for minors.
<h3><strong>Implementation Timeline and Next Steps</strong></h3>
The Norwegian government plans to send the proposed legislation for consultation within the European Economic Area before the summer. This process typically lasts around three months. Full enforcement of the Norway social media age limit is expected once the Digital Services Act is incorporated into Norwegian law.

Officials say recent trends support the move. <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="Data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27983">Data</a> indicates a decline in the number of children owning smartphones and using social media, partly due to national screen-time guidelines and initiatives such as mobile-free schools.

The government intends to implement the policy in stages, but it has made clear that service providers are expected to begin compliance preparations immediately.
<h3><strong>A Shift in Digital Policy</strong></h3>
The Norway social media age limit reflects growing concern among policymakers about the impact of digital platforms on<a href="https://thecyberexpress.com/google-gemini-ai-for-kids/" target="_blank" rel="noopener"> children’s mental health</a>, privacy, and development. By placing legal responsibility on technology companies and aligning with European regulation, Norway is positioning itself at the forefront of this policy shift.

As similar measures gain traction across Europe, the effectiveness of age verification and enforcement will be closely watched.

The Norwegian model could become a reference point for other countries seeking to balance digital access with child protection.]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111659</post-id>	</item>
		<item>
		<title>The Cyber Express Weekly Roundup: Data Breaches, Malware Campaigns, and Cyber Fraud Investigations</title>
		<link>https://thecyberexpress.com/tce-weekly-roundup-april-2026/</link>
		
		<dc:creator><![CDATA[Ashish Khaitan]]></dc:creator>
		<pubDate>Fri, 24 Apr 2026 11:57:27 +0000</pubDate>
				<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Dark Web News]]></category>
		<category><![CDATA[Data Breach News]]></category>
		<category><![CDATA[Threat Actors]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[cyberattacks]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breaches]]></category>
		<category><![CDATA[data leaks]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<category><![CDATA[weekly roundup]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111644</guid>

					<description><![CDATA[<p><img width="1185" height="685" src="https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="weekly roundup TCE cybersecurity news" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news.webp 1185w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-300x173.webp 300w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-1024x592.webp 1024w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-768x444.webp 768w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-600x347.webp 600w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-150x87.webp 150w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-750x434.webp 750w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-1140x659.webp 1140w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news.webp 1185w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-300x173.webp 300w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-1024x592.webp 1024w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-768x444.webp 768w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-600x347.webp 600w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-150x87.webp 150w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-750x434.webp 750w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-1140x659.webp 1140w" sizes="(max-width: 1185px) 100vw, 1185px" title="The Cyber Express Weekly Roundup: Data Breaches, Malware Campaigns, and Cyber Fraud Investigations 19"></p><span data-contrast="auto">In this week’s edition of <a href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> weekly roundup, we explore the latest developments in the world of cybersecurity, focusing on high-profile data breaches, growing malware campaigns, and law enforcement actions against cybercriminals. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">As the digital threat landscape continues to evolve, attackers are targeting sensitive personal and organizational data, from health records to financial credentials. Meanwhile, government regulators are ramping efforts to protect minors and combat harmful content on social platforms, while cybercriminals continue to <a class="wpil_keyword_link" href="https://cyble.com/exploit/" target="_blank"  rel="noopener" title="exploit" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27978">exploit</a> vulnerabilities in both public and private sectors.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">This weekly roundup highlights how various industries, from healthcare and social media to finance and government, are grappling with rising threats, making it clear that the intersection of data security, regulation, and <a href="https://en.wikipedia.org/wiki/Cybercrime" target="_blank" rel="nofollow noopener">cybercrime</a> is more critical than ever. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">The Cyber Express Weekly Roundup</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<h4 aria-level="3"><b><span data-contrast="none">UK Biobank Data Breach Triggers Urgent Review of Data Security Measures</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">A significant <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-a-data-breach/" target="_blank"  rel="noopener" title="data breach" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27977">data breach</a> at the UK Biobank has raised major concerns over the security of health-related data used in scientific research. In April 2026, de-identified participant information was discovered being sold on a Chinese consumer platform, sparking widespread alarm among the research community. </span><a href="https://thecyberexpress.com/uk-biobank-data-breach-healthcare/" target="_blank" rel="noopener"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">Vercel CEO Reveals Expansion of Malware Campaign Affecting Multiple Targets</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">Vercel's CEO, Guillermo Rauch, confirmed that the recent breach involving Context.ai was part of a much larger <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-malware/"   title="malware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27975">malware</a> campaign affecting multiple targets. Following a review of network logs, Vercel’s security team uncovered evidence of <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-malware/" target="_blank"  rel="noopener" title="malware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27981">malware</a> distribution that compromised several customer accounts, including access to valuable Vercel account keys. </span><a href="https://thecyberexpress.com/vercel-hacker-active-beyond-context-ai-hack/" target="_blank" rel="noopener"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">Ofcom Investigates Telegram and Teen Platforms</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">In the UK, Ofcom has launched an investigation into Telegram and several popular teen chat platforms, such as Teen Chat and Chat Avenue, after reports surfaced of online grooming and child sexual abuse material (CSAM) on these services. Under the Online Safety Act, platforms are required to take proactive steps to prevent harmful content and protect minors from exploitation. </span><a href="https://thecyberexpress.com/ofcom-investigation-targets-telegram/" target="_blank" rel="noopener"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:279}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">Personal Data Exposed in Breach of France’s ANTS Portal</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">A recent breach of France’s ANTS (Agence Nationale des Titres Sécurisés) portal has compromised personal <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27982">data</a>, including names, email addresses, and birthdates, although no documents or sensitive attachments were affected. The breach, which occurred on April 15, 2026, raises significant concerns about identity theft and phishing <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risks" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27974">risks</a>, as the exposed data could be used to target individuals. </span><a href="https://thecyberexpress.com/ants-data-breach-impacts-user-personal-details/" target="_blank" rel="noopener"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">Bluesky Faces Coordinated DDoS Attack</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">Bluesky, the rapidly expanding social media platform, suffered a major disruption on April 15, 2026, when it was targeted by a sophisticated distributed denial-of-service (DDoS) attack. The attack caused widespread outages, impacting core platform functions such as user feeds, notifications, and search capabilities. </span><a href="https://thecyberexpress.com/bluesky-cyberattack-ddos-outage/" target="_blank" rel="noopener"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">Indian Authorities Arrest Key SIM Card Supplier in Cyber Fraud Crackdown</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">India’s Central Bureau of Investigation (CBI) has arrested a key conspirator in a major <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyber" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27979">cyber</a> fraud operation as part of Operation Chakra-V. The suspect, arrested in Guwahati, is accused of supplying fraudulent SIM cards used in various <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/" target="_blank"  rel="noopener" title="cybercrime" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27976">cybercrime</a> schemes, including extortion and fake loan scams. The SIM cards were acquired using fake identities and distributed to cybercriminal networks. </span><a href="https://thecyberexpress.com/indian-agency-arrests-key-sim-card-supplier/" target="_blank" rel="noopener"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Weekly Takeaway</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">This week’s roundup highlights the diverse and evolving nature of cyber threats. From the exposure of sensitive health data and sophisticated malware campaigns to DDoS attacks and SIM card fraud schemes, the <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-cybersecurity/" target="_blank"  rel="noopener" title="cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27973">cybersecurity</a> landscape remains fraught with challenges. </span>

<span data-contrast="auto">Regulatory bodies and companies alike continue to grapple with emerging risks, particularly in sectors like public health data, social media platforms, and digital content safety. As these incidents unfold, it’s clear that both technical vulnerabilities and human factors, such as <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-social-engineering/" target="_blank"  rel="noopener" title="social engineering" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27980">social engineering</a>, continue to be central targets for attackers.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">With regulatory frameworks like the Online Safety Act and increased investigative efforts in places like India and France, the pressure on platforms and authorities to act quickly and decisively is higher than ever. As the cyber threat landscape becomes more interconnected, the need for enhanced security protocols, improved monitoring, and greater accountability in digital spaces remains critical.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>]]></description>
										<content:encoded><![CDATA[<p><img width="1185" height="685" src="https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="weekly roundup TCE cybersecurity news" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news.webp 1185w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-300x173.webp 300w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-1024x592.webp 1024w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-768x444.webp 768w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-600x347.webp 600w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-150x87.webp 150w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-750x434.webp 750w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-1140x659.webp 1140w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news.webp 1185w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-300x173.webp 300w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-1024x592.webp 1024w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-768x444.webp 768w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-600x347.webp 600w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-150x87.webp 150w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-750x434.webp 750w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-cybersecurity-news-1140x659.webp 1140w" sizes="(max-width: 1185px) 100vw, 1185px" title="The Cyber Express Weekly Roundup: Data Breaches, Malware Campaigns, and Cyber Fraud Investigations 20"></p><span data-contrast="auto">In this week’s edition of <a href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> weekly roundup, we explore the latest developments in the world of cybersecurity, focusing on high-profile data breaches, growing malware campaigns, and law enforcement actions against cybercriminals. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">As the digital threat landscape continues to evolve, attackers are targeting sensitive personal and organizational data, from health records to financial credentials. Meanwhile, government regulators are ramping efforts to protect minors and combat harmful content on social platforms, while cybercriminals continue to <a class="wpil_keyword_link" href="https://cyble.com/exploit/" target="_blank"  rel="noopener" title="exploit" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27978">exploit</a> vulnerabilities in both public and private sectors.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">This weekly roundup highlights how various industries, from healthcare and social media to finance and government, are grappling with rising threats, making it clear that the intersection of data security, regulation, and <a href="https://en.wikipedia.org/wiki/Cybercrime" target="_blank" rel="nofollow noopener">cybercrime</a> is more critical than ever. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">The Cyber Express Weekly Roundup</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<h4 aria-level="3"><b><span data-contrast="none">UK Biobank Data Breach Triggers Urgent Review of Data Security Measures</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">A significant <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-a-data-breach/" target="_blank"  rel="noopener" title="data breach" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27977">data breach</a> at the UK Biobank has raised major concerns over the security of health-related data used in scientific research. In April 2026, de-identified participant information was discovered being sold on a Chinese consumer platform, sparking widespread alarm among the research community. </span><a href="https://thecyberexpress.com/uk-biobank-data-breach-healthcare/" target="_blank" rel="noopener"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">Vercel CEO Reveals Expansion of Malware Campaign Affecting Multiple Targets</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">Vercel's CEO, Guillermo Rauch, confirmed that the recent breach involving Context.ai was part of a much larger <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-malware/"   title="malware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27975">malware</a> campaign affecting multiple targets. Following a review of network logs, Vercel’s security team uncovered evidence of <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-malware/" target="_blank"  rel="noopener" title="malware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27981">malware</a> distribution that compromised several customer accounts, including access to valuable Vercel account keys. </span><a href="https://thecyberexpress.com/vercel-hacker-active-beyond-context-ai-hack/" target="_blank" rel="noopener"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">Ofcom Investigates Telegram and Teen Platforms</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">In the UK, Ofcom has launched an investigation into Telegram and several popular teen chat platforms, such as Teen Chat and Chat Avenue, after reports surfaced of online grooming and child sexual abuse material (CSAM) on these services. Under the Online Safety Act, platforms are required to take proactive steps to prevent harmful content and protect minors from exploitation. </span><a href="https://thecyberexpress.com/ofcom-investigation-targets-telegram/" target="_blank" rel="noopener"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:279}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">Personal Data Exposed in Breach of France’s ANTS Portal</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">A recent breach of France’s ANTS (Agence Nationale des Titres Sécurisés) portal has compromised personal <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27982">data</a>, including names, email addresses, and birthdates, although no documents or sensitive attachments were affected. The breach, which occurred on April 15, 2026, raises significant concerns about identity theft and phishing <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risks" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27974">risks</a>, as the exposed data could be used to target individuals. </span><a href="https://thecyberexpress.com/ants-data-breach-impacts-user-personal-details/" target="_blank" rel="noopener"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">Bluesky Faces Coordinated DDoS Attack</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">Bluesky, the rapidly expanding social media platform, suffered a major disruption on April 15, 2026, when it was targeted by a sophisticated distributed denial-of-service (DDoS) attack. The attack caused widespread outages, impacting core platform functions such as user feeds, notifications, and search capabilities. </span><a href="https://thecyberexpress.com/bluesky-cyberattack-ddos-outage/" target="_blank" rel="noopener"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">Indian Authorities Arrest Key SIM Card Supplier in Cyber Fraud Crackdown</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">India’s Central Bureau of Investigation (CBI) has arrested a key conspirator in a major <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyber" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27979">cyber</a> fraud operation as part of Operation Chakra-V. The suspect, arrested in Guwahati, is accused of supplying fraudulent SIM cards used in various <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/" target="_blank"  rel="noopener" title="cybercrime" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27976">cybercrime</a> schemes, including extortion and fake loan scams. The SIM cards were acquired using fake identities and distributed to cybercriminal networks. </span><a href="https://thecyberexpress.com/indian-agency-arrests-key-sim-card-supplier/" target="_blank" rel="noopener"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Weekly Takeaway</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">This week’s roundup highlights the diverse and evolving nature of cyber threats. From the exposure of sensitive health data and sophisticated malware campaigns to DDoS attacks and SIM card fraud schemes, the <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-cybersecurity/" target="_blank"  rel="noopener" title="cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27973">cybersecurity</a> landscape remains fraught with challenges. </span>

<span data-contrast="auto">Regulatory bodies and companies alike continue to grapple with emerging risks, particularly in sectors like public health data, social media platforms, and digital content safety. As these incidents unfold, it’s clear that both technical vulnerabilities and human factors, such as <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-social-engineering/" target="_blank"  rel="noopener" title="social engineering" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27980">social engineering</a>, continue to be central targets for attackers.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">With regulatory frameworks like the Online Safety Act and increased investigative efforts in places like India and France, the pressure on platforms and authorities to act quickly and decisively is higher than ever. As the cyber threat landscape becomes more interconnected, the need for enhanced security protocols, improved monitoring, and greater accountability in digital spaces remains critical.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111644</post-id>	</item>
		<item>
		<title>UK Biobank Leak Prompts Urgent Review of Data Protection in Biomedical Research</title>
		<link>https://thecyberexpress.com/uk-biobank-data-breach-healthcare/</link>
		
		<dc:creator><![CDATA[Ashish Khaitan]]></dc:creator>
		<pubDate>Fri, 24 Apr 2026 08:55:15 +0000</pubDate>
				<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Data Breach News]]></category>
		<category><![CDATA[Alibaba]]></category>
		<category><![CDATA[de-identified data]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<category><![CDATA[UK Biobank data breach]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111639</guid>

					<description><![CDATA[<p><img width="1126" height="614" src="https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="UK Biobank data breach" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach.webp 1126w, https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach-300x164.webp 300w, https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach-1024x558.webp 1024w, https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach-768x419.webp 768w, https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach-600x327.webp 600w, https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach-150x82.webp 150w, https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach-750x409.webp 750w, https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach.webp 1126w, https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach-300x164.webp 300w, https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach-1024x558.webp 1024w, https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach-768x419.webp 768w, https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach-600x327.webp 600w, https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach-150x82.webp 150w, https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach-750x409.webp 750w" sizes="(max-width: 1126px) 100vw, 1126px" title="UK Biobank Leak Prompts Urgent Review of Data Protection in Biomedical Research 21"></p><span data-contrast="auto">The UK Biobank data breach has intensified scrutiny around the handling and protection of sensitive health information, even when such data is stripped of personally identifiable details. Widely regarded as one of the most significant biomedical research resources in the world, UK Biobank holds extensive genetic, lifestyle, and medical data contributed by around 500,000 volunteers. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The recent <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-a-data-breach/" target="_blank"  rel="noopener" title="data breach" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27969">data breach</a> at UK Biobank, which involved the unauthorized listing of participant data for sale on a Chinese consumer website linked to Alibaba, has sparked concern among participants, researchers, and cybersecurity experts alike.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">The UK Biobank Data Breach</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">The <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27972">data</a> breach at UK Biobank came to light in April 2026, when officials discovered that de-identified data belonging to participants had been listed for sale online. The listings appeared on a consumer platform owned by Alibaba, sparking immediate concern among researchers and participants alike.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">UK Biobank, a biomedical database established in 2003, contains extensive genetic, lifestyle, and <a href="https://thecyberexpress.com/manage-my-health-data-breach-phishing/" target="_blank" rel="noopener">health data</a> from around 500,000 UK volunteers. This dataset has been a cornerstone for global medical research, contributing to thousands of discoveries since access was opened to scientists in 2012.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto"><a href="https://www.ukbiobank.ac.uk/news/a-message-to-our-participants-uk-biobank-data-security-update/" target="_blank" rel="nofollow noopener">Professor Sir Rory Collins</a>, chief executive and principal investigator of UK Biobank, confirmed the breach in an official statement. He said, “Last week, we found that de-identified participant data made available to researchers at three academic institutions were listed for sale on a consumer website in China, owned by Alibaba.”</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">He added that with support from UK and Chinese authorities, Alibaba “swiftly removed those listings before any sales were made.”</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Nature of the Exposed Data</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">Despite the seriousness of the UK Biobank data breach, officials stressed that the compromised information did not include personally identifiable details. According to Collins, the dataset did not contain names, addresses, dates of birth, or NHS numbers.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">“All the data are de-identified,” he said, emphasising that there is no evidence that participants were directly identified as a result of the breach.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">However, the incident still represents a violation of strict data access agreements. The data had been shared with three academic institutions under contracts that require secure handling and prohibit unauthorized distribution. Collins described the situation as “a clear breach of the contract,” noting that the institutions and individuals involved have had their access suspended.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Immediate Response to the Data Breach at UK Biobank</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">In response to the data breach at UK Biobank, the organization moved quickly to contain the <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risk" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27970">risk</a> and reassure participants. Access to its research platform has been temporarily suspended while new protection methods are implemented.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Among the measures introduced:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<ul>
 	<li><span data-contrast="auto">Strict limits on the size of files that researchers can export </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">Daily monitoring of all exported files for suspicious activity </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">A comprehensive, board-led forensic investigation </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<span data-contrast="auto">“These <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27971">security</a> measures will further minimise the potential for misuse of UK Biobank data,” Collins said.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto"><a href="https://thecyberexpress.com/totalrecall-windows-recall-security-gap/" target="_blank" rel="noopener">Researchers</a> typically access the data through a restricted, cloud-based platform hosted in the UK. The system is designed to ensure that sensitive information </span><span data-contrast="auto">remains secure while still enabling scientific discovery. Following the breach, additional controls are being layered onto this infrastructure.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>]]></description>
										<content:encoded><![CDATA[<p><img width="1126" height="614" src="https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="UK Biobank data breach" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach.webp 1126w, https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach-300x164.webp 300w, https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach-1024x558.webp 1024w, https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach-768x419.webp 768w, https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach-600x327.webp 600w, https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach-150x82.webp 150w, https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach-750x409.webp 750w, https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach.webp 1126w, https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach-300x164.webp 300w, https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach-1024x558.webp 1024w, https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach-768x419.webp 768w, https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach-600x327.webp 600w, https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach-150x82.webp 150w, https://thecyberexpress.com/wp-content/uploads/UK-Biobank-data-breach-750x409.webp 750w" sizes="(max-width: 1126px) 100vw, 1126px" title="UK Biobank Leak Prompts Urgent Review of Data Protection in Biomedical Research 22"></p><span data-contrast="auto">The UK Biobank data breach has intensified scrutiny around the handling and protection of sensitive health information, even when such data is stripped of personally identifiable details. Widely regarded as one of the most significant biomedical research resources in the world, UK Biobank holds extensive genetic, lifestyle, and medical data contributed by around 500,000 volunteers. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The recent <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-a-data-breach/" target="_blank"  rel="noopener" title="data breach" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27969">data breach</a> at UK Biobank, which involved the unauthorized listing of participant data for sale on a Chinese consumer website linked to Alibaba, has sparked concern among participants, researchers, and cybersecurity experts alike.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">The UK Biobank Data Breach</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">The <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27972">data</a> breach at UK Biobank came to light in April 2026, when officials discovered that de-identified data belonging to participants had been listed for sale online. The listings appeared on a consumer platform owned by Alibaba, sparking immediate concern among researchers and participants alike.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">UK Biobank, a biomedical database established in 2003, contains extensive genetic, lifestyle, and <a href="https://thecyberexpress.com/manage-my-health-data-breach-phishing/" target="_blank" rel="noopener">health data</a> from around 500,000 UK volunteers. This dataset has been a cornerstone for global medical research, contributing to thousands of discoveries since access was opened to scientists in 2012.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto"><a href="https://www.ukbiobank.ac.uk/news/a-message-to-our-participants-uk-biobank-data-security-update/" target="_blank" rel="nofollow noopener">Professor Sir Rory Collins</a>, chief executive and principal investigator of UK Biobank, confirmed the breach in an official statement. He said, “Last week, we found that de-identified participant data made available to researchers at three academic institutions were listed for sale on a consumer website in China, owned by Alibaba.”</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">He added that with support from UK and Chinese authorities, Alibaba “swiftly removed those listings before any sales were made.”</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Nature of the Exposed Data</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">Despite the seriousness of the UK Biobank data breach, officials stressed that the compromised information did not include personally identifiable details. According to Collins, the dataset did not contain names, addresses, dates of birth, or NHS numbers.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">“All the data are de-identified,” he said, emphasising that there is no evidence that participants were directly identified as a result of the breach.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">However, the incident still represents a violation of strict data access agreements. The data had been shared with three academic institutions under contracts that require secure handling and prohibit unauthorized distribution. Collins described the situation as “a clear breach of the contract,” noting that the institutions and individuals involved have had their access suspended.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Immediate Response to the Data Breach at UK Biobank</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">In response to the data breach at UK Biobank, the organization moved quickly to contain the <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risk" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27970">risk</a> and reassure participants. Access to its research platform has been temporarily suspended while new protection methods are implemented.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Among the measures introduced:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<ul>
 	<li><span data-contrast="auto">Strict limits on the size of files that researchers can export </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">Daily monitoring of all exported files for suspicious activity </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">A comprehensive, board-led forensic investigation </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<span data-contrast="auto">“These <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27971">security</a> measures will further minimise the potential for misuse of UK Biobank data,” Collins said.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto"><a href="https://thecyberexpress.com/totalrecall-windows-recall-security-gap/" target="_blank" rel="noopener">Researchers</a> typically access the data through a restricted, cloud-based platform hosted in the UK. The system is designed to ensure that sensitive information </span><span data-contrast="auto">remains secure while still enabling scientific discovery. Following the breach, additional controls are being layered onto this infrastructure.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111639</post-id>	</item>
	</channel>
</rss>