Weekly Cyber Threat Roundup: Key Breaches and Vulnerabilities (April 27)

By ⚡ min read

Introduction

The past week has seen a flurry of cybersecurity incidents and disclosures, ranging from supply-chain attacks to AI-driven exploitation platforms. This roundup covers the most significant threats, breaches, and vulnerabilities reported as of April 27, providing IT professionals and security teams with the context needed to fortify their defenses. From compromised OAuth tokens at Vercel to a critical ASP.NET Core flaw, here’s what you need to know.

Weekly Cyber Threat Roundup: Key Breaches and Vulnerabilities (April 27)
Source: research.checkpoint.com

Top Attacks and Breaches

Vercel and Context.ai: OAuth Token Theft

Frontend cloud platform Vercel disclosed a security incident stemming from a compromise at Context.ai. Attackers stole OAuth tokens that allowed unauthorized access via a connected application. The breach exposed employee information, internal logs, and a subset of environment variables, though Vercel stated that the most sensitive secrets were not included. This incident highlights the cascading risks of third-party integrations and token management.

France Titres Data Breach

France’s authority for identity and registration documents, France Titres, detected a data breach on April 15. The incident may have exposed names, birth dates, email addresses, login IDs, and some physical addresses and phone numbers. A hacker has already offered purported agency data for sale on the dark web, raising concerns about identity theft and fraud.

UK Biobank: Health Data of 500,000 Volunteers at Risk

The UK Biobank, a major research organization, confirmed a breach after de-identified health data on half a million volunteers was advertised for sale on Chinese marketplaces. Officials reported that the listings were removed and believed to be unsold, but the organization has suspended access, shut down the research platform, and imposed download limits. This event underscores the peril of even anonymized sensitive datasets.

Bitwarden Supply-Chain Attack via npm

Popular password manager Bitwarden suffered a supply-chain attack when a malware-tainted CLI release was published to npm on April 22. According to Bitwarden, 334 developers installed version 2026.4.0 during a brief window, potentially exposing credentials. The attack exploited a hijacked GitHub account, but the company assured that vault data remained unaffected. This incident serves as a reminder to verify software sources, especially for developer tools.

AI Threats

Unauthorized Access to Anthropic’s Unreleased AI Model

Researchers flagged unauthorized access to Anthropic’s Claude Mythos Preview, an unreleased AI cyber model, through a third-party vendor environment. A small Discord group reportedly used shared contractor accounts, API keys, and predictable URLs to reach the system. Anthropic stated it is investigating and has not seen impact to core systems, but the incident highlights the risk of early access to powerful AI tools.

Bissa Scanner: AI-Assisted Exploitation Platform

Researchers observed Bissa Scanner, an AI-assisted exploitation platform that uses Claude Code and OpenClaw to automate mass scanning, exploitation, and credential harvesting. The operation focused on exploiting the React2Shell vulnerability (CVE-2025-55182). Bissa scanned millions of targets, confirmed over 900 compromises, and collected tens of thousands of exposed environment files. This demonstrates how AI is enabling threat actors to scale their attacks.

Weekly Cyber Threat Roundup: Key Breaches and Vulnerabilities (April 27)
Source: research.checkpoint.com

Google Antigravity IDE Prompt Injection

Researchers highlighted a prompt-injection exploit chain in Google’s Antigravity agentic IDE that allowed sandbox escape and remote code execution. The flaw abused a file search tool that ran before security checks, letting attackers convert a benign prompt into system compromise—even in Secure Mode. Google has patched the vulnerability, but the incident shows how agentic AI tools can introduce novel attack surfaces.

Vulnerabilities and Patches

Microsoft Out-of-Band Fix for ASP.NET Core Flaw

Microsoft issued out-of-band fixes for CVE-2026-40372, a critical ASP.NET Core privilege escalation flaw rated 9.1. A bug in Data Protection versions 10.0.0 to 10.0.6 could let attackers forge cookies and antiforgery tokens, impersonate users, and gain SYSTEM-level access on Linux or macOS deployments. Administrators are urged to apply the patch immediately.

Apple iOS/iPadOS Notification Services Bug

Apple released fixes for CVE-2026-28950 in iOS and iPadOS, a Notification Services bug that could allow an attacker to read sensitive information. The vulnerability affected how the system handles certain notifications, potentially leaking data. Users should update their devices to the latest version to mitigate the risk.

Conclusion

This week’s intelligence underscores the importance of monitoring third-party risks, applying patches promptly, and staying vigilant against AI-driven exploits. As threat actors continue to innovate, organizations must adopt a proactive security posture—conducting regular audits, enforcing least-privilege access, and keeping software up to date. For a deeper dive into these findings, download the full Threat Intelligence Bulletin.

Recommended

Discover More

How to Leverage Congressional Hearings to Safeguard NIH Funding and Vaccine ResearchHow Meta’s Adaptive Ranking Model Revolutionizes Ad Serving at ScaleA Step-by-Step Guide to Understanding Neanderthal Brain Size and CognitionPeacock Overtakes Rivals as Top Destination for Comfort TV, New Data RevealsExploring Digital Finance: Key Questions About HederaCon 2026 in Miami Beach