Latest Internet & Cybersecurity News

📅April 1, 2026 at 1:00 AM
Major supply chain attacks hit Axios npm and Cisco via Trivy; critical flaws exploited in Citrix, F5; AI boosts cyber market amid nation-state threats.
1

North Korean Hackers Suspected in Axios NPM Supply Chain Attack

Hackers compromised the Axios npm package, used by millions weekly for web requests, publishing malicious versions with cross-platform RAT malware targeting Windows, macOS, and Linux.Source 2Source 6Source 8 The attack lasted about 3 hours on March 31, potentially affecting 600,000 downloads; users urged to pin versions and rotate credentials.Source 6Source 12 Google attributes it to UNC1069, a North Korean group experienced in supply chains.Source 6

2

Cisco Source Code Stolen in Trivy-Linked Dev Environment Breach

Threat actors used stolen credentials from the recent Trivy supply chain attack to breach Cisco's internal development environment, stealing source code for Cisco and its customers.Source 8 This incident highlights ongoing risks from the TeamPCP campaign targeting developer tools.Source 8Source 10 Organizations using affected tools should audit and rotate credentials immediately.Source 8

3

CISA Orders Feds to Patch Actively Exploited Citrix NetScaler Flaw

CISA mandated federal agencies to patch Citrix NetScaler appliances against CVE-2026-3055, a critical memory flaw actively exploited to steal sensitive data.Source 8 The vulnerability affects ADC and Gateway products; immediate patching is required by Thursday.Source 8 Hackers are deploying attacks to obtain unauthorized access.Source 8

4

F5 BIG-IP Critical RCE Flaw Exploited to Deploy Webshells

F5 reclassified a BIG-IP APM vulnerability as critical RCE, now actively exploited by attackers to install webshells on unpatched devices.Source 8 The flaw enables denial-of-service and remote code execution; patch immediately to mitigate risks.Source 8 Exploitation is ongoing, targeting network infrastructure.Source 8

5

Telnyx PyPI Package Compromised in TeamPCP Supply Chain Attack

The Telnyx Python SDK on PyPI (versions 4.87.1 and 4.87.2) was hit by TeamPCP, linked to Trivy, containing multi-stage infostealer malware.Source 10 This follows a wave of developer tool compromises; check dependencies and update packages.Source 10 PyPI users face heightened supply chain risks from such campaigns.Source 10

6

15-Year-Old strongSwan Flaw Enables VPN Crashes via Integer Underflow

CVE-2026-25075 in strongSwan's EAP-TTLS plugin (versions 4.5.0-6.0.4) allows attackers to crash VPNs through massive memory corruption.Source 10 The critical vulnerability has existed for 15 years; update to latest versions immediately.Source 10 This poses risks to VPN-reliant organizations worldwide.Source 10

7

Live Cyber Attack Map Shows US, Germany as Top Targets

Real-time data reveals US, Germany, UK, India, and Brazil as most targeted countries in last 24 hours, with DDoS, phishing, ransomware, botnets dominant.Source 4 Critical CVEs include Apache Web Server (CVE-2026-12345) and OpenSSL RCE (CVE-2026-34567).Source 4 Businesses should prioritize patching and vigilance against these trends.Source 4

8

HUB Cyber Security Announces Leadership Transition

HUB Cyber Security, a global leader in confidential computing and AI-driven data fabric, announced a leadership change on April 1.Source 1 The transition aims to strengthen its position amid rising cyber threats.Source 1 Details on new leadership were released via GlobeNewswire.Source 1

9

AI-Driven Cybersecurity Market Hits $244 Billion, Korean Firms Expand

The AI-powered cybersecurity market reaches $244 billion, with Korean companies targeting global growth.Source 3 Published April 1, this reflects surging demand for advanced defenses.Source 3 Expansion focuses on AI innovations against evolving threats.Source 3

10

AI Systems Redefine Enterprise Attack Surface

Booz Allen expert explains AI as a new distinct attack surface, transforming security management.Source 7 Enterprises must adapt strategies to protect AI deployments.Source 7 The shift requires treating AI uniquely in threat models.Source 7

11

AI and Quantum Threats Force Rethink of Digital Trust

DigiCert CEO highlights how AI-driven identities and quantum risks reshape digital trust foundations.Source 9 Organizations need updated approaches for 2026 threats.Source 9 This impacts PKI and identity verification globally.Source 9

12

Identity to Define Cybersecurity in 2026 Amid AI Threats

Resilience in hybrid, AI-driven landscapes makes identity central to cyber strategies.Source 11 Rising pressures demand robust identity security across environments.Source 11 2026 policies emphasize this focus.Source 11