Take action on the latest cybersecurity events
Cybersecurity advisories and events as they happen, with a clear action you can take.
published: April 20, 2026
Week 16 of 2026 saw 17 advisories and 22 incidents, with 16.7 million individuals impacted, driven largely by the McGraw-Hill Salesforce misconfiguration breach (13.5M) alongside major ransomware, phishing, and third-party compromises affecting healthcare, finance, and tech sectors. Key vulnerabilities included actively exploited zero-days in Microsoft products, critical flaws in Cisco, Fortinet, SAP, and Adobe, and a systemic RCE risk in the MCP protocol.
published: April 18, 2026
Payouts King ransomware uses QEMU virtual machines to bypass endpoint security and establish hidden backdoors on compromised systems. The campaign exploits vulnerabilities in Citrix and SolarWinds to gain initial access before exfiltrating sensitive Active Directory data.
published: April 13, 2026
During the week of April 6–13, 2026, there were 9 vulnerability advisories and 23 data breach/incident events, up from 20 the prior week affecting over 41,500 known individuals across sectors like IT, healthcare, and government, with malware/ransomware and third-party compromises as the leading causes. Major events included several actively exploited zero-days (e.g., Adobe Reader, Chrome), major breaches at organizations like LAPD (7.7 TB leaked) and a Chinese supercomputing center (10 PB), and multiple ransomware attacks disrupting healthcare and other critical services.
A Citizen Lab investigation reveals a surveillance system Webloc, now sold by U.S.-based Penlink, exploits mobile advertising data and app SDKs to track the locations and behaviors of up to 500 million devices globally, providing warrantless access to military, intelligence, and law enforcement agencies across multiple countries. The report also exposes related tools including Trapdoor, a phishing and device-exploitation platform, and documents widespread civil liberties violations, GDPR concerns, and links to spyware vendor Quadream.
published: April 6, 2026
During the week of March 30–April 6, 2026, cybersecurity activity included 11 vulnerability advisories (featuring actively exploited zero-days in Citrix, Fortinet, and TrueConf) and 20 incidents dominated by ransomware/malware (5), third-party compromises (3), and heavily hitting healthcare (6) and tech (4). At least 178,530 individuals are affected, led by the DocketWise breach exposing 116,000 immigration client records.
published: April 3, 2026
Research published on browsergate.eu reports that LinkedIn silently scans visitors' Chromium-based browsers for over 6,000 installed extensions, revealing indicators of sensitive personal data like religion, health, politics, and job-search activity. The findings were independently confirmed, though the "BrowserGate" investigation behind the disclosure was funded by a data scraper company Teamfluence, a company with a direct commercial dispute with LinkedIn over extension-blocking practices.
published: March 30, 2026
During the week of March 23–30, 2026, cybersecurity incidents surged to 32 (up from 14 the prior week), impacting over 14.6 million individuals, with malware/ransomware as the leading cause (11 incidents) and healthcare and government as the most targeted sectors. The week also saw 16 vulnerability advisories, including critical zero-days in F5 BIG-IP and Telegram alongside supply chain attacks and breaches affecting organizations from the European Commission to major healthcare providers.
published: March 23, 2026
During the week of March 16–23, 2026, there were 17 vulnerability advisories and 14 data breach/incident events. Social engineering, phishing, and unauthorized access are the leading causes impacting nearly 9 million individuals across government, healthcare, and tech sectors. Key threats included actively exploited zero-days in Chrome, SharePoint, and iPhones, a major supply chain attack on Aqua Security's Trivy scanner. Major incidents are the 5-million-record Companies House data leak and a paralyzing ransomware attack on Foster City.
published: March 16, 2026
During the week of March 9–16, 2026, the cybersecurity landscape saw 22 advisories and 16 incidents including ransomware, data breaches, and actively exploited vulnerabilities in products like SolarWinds, Ivanti, and Salesforce. Over 3.3 million individuals impacted, largely by a single Cal AI breach exposing 3 million records. Malware/ransomware and software vulnerability exploits were the leading causes, hitting sectors from healthcare and finance to consulting and food & beverage.
published: March 11, 2026
The February 28, 2026 Middle East military conflict has triggered a surge in cyber operations: 149 hacktivist attacks across 16 countries in just three days spanning VPN/firewall exploitation, AI-enhanced phishing, wiper malware, and DDoS campaigns targeting organizations of all sizes and sectors globally.