Data Breaches

Cyber Threat Report: Data Breaches, AI Exploits & Vulnerabil

The cyber threat landscape is ablaze with widespread data breaches and increasingly sophisticated AI exploits. This report dives into the week's most critical incidents, from platform compromises to AI model manipulation.

{# Always render the hero — falls back to the theme OG image when article.image_url is empty (e.g. after the audit's repair_hero_images cleared a blocked Unsplash hot-link). Without this fallback, evergreens with cleared image_url render no hero at all → the JSON-LD ImageObject loses its visual counterpart and LCP attrs go missing. #}
Abstract network nodes with red alert indicators symbolizing cybersecurity threats.

Key Takeaways

  • Vercel, France Titres, and UK Biobank reported significant data breaches, exposing sensitive customer and volunteer information.
  • AI models are becoming targets, with unauthorized access to Anthropic's Claude Mythos Preview and exploitation of Google's Antigravity agentic IDE.
  • Critical vulnerabilities in ASP.NET Core, iOS/iPadOS, LMDeploy, and end-of-life D-Link routers require immediate attention.
  • Ransomware-as-a-service operations like 'The Gentlemen' are sophisticated and widespread, while espionage campaigns continue to target critical sectors.

Data Breaches Escalate Dramatically

This week’s cyber intelligence paints a grim picture of escalating data breaches across critical sectors. Vercel, a prominent frontend cloud platform, disclosed a significant security incident originating from a compromise at Context.ai. Stolen OAuth tokens became the keys to unauthorized access through a connected app, leading to the exposure of employee information, internal logs, and a subset of environment variables. While the company assures that its most sensitive secrets remained secure, the incident underscores the perilous ripple effect of third-party vendor breaches.

France Titres, the French authority responsible for identity and registration documents, also confirmed a data breach on April 15th. The exposed information reportedly includes names, birth dates, email addresses, login IDs, and some physical addresses and phone numbers. The chilling aftermath? Purported agency data has surfaced for sale on the dark web, a stark reminder of the financial incentive driving these attacks.

Even research organizations aren’t immune. UK Biobank, a vital UK research entity, confirmed a breach after de-identified health data belonging to 500,000 volunteers appeared on Chinese marketplaces. Although officials claim the listings were removed and unsold, and access has since been suspended with download limits imposed, the integrity of such sensitive data for research purposes is now undeniably compromised.

AI Unleashed: New Exploitation Avenues

But the threat landscape isn’t just about stolen credentials and PII. Artificial intelligence, once heralded as a shield, is increasingly becoming a weaponized tool. Researchers have flagged unauthorized access to Anthropic’s Claude Mythos Preview, an unreleased AI cyber model, via a third-party vendor environment. A small Discord group reportedly exploited shared contractor accounts, API keys, and predictable URLs to infiltrate the system. Anthropic is investigating, but the implications of unauthorized access to nascent AI defensive models are profound.

We’re also seeing AI actively assisting in offensive operations. The Bissa Scanner, an AI-assisted exploitation platform, utilizes Claude Code and OpenClaw to facilitate mass scanning, exploitation, and credential harvesting. Its primary focus has been the React2Shell vulnerability (CVE-2025-55182), scanning millions of targets, confirming over 900 compromises, and pilfering tens of thousands of exposed environment files. This isn’t just theoretical; it’s operationalized threat-hunting at scale, powered by AI.

Prompt injection, that seemingly innocuous technique, is also proving to be a potent vector. A prompt-injection exploit chain was highlighted in Google’s Antigravity agentic IDE, enabling sandbox escape and remote code execution. The flaw cleverly abused a file search tool that executed before security checks, allowing attackers to transform a benign prompt into a full system compromise, even in secure modes. While Google has since patched this, it highlights the inherent fragility of AI systems when subjected to adversarial inputs.

Is Your Password Manager Safe From Supply Chain Attacks?

Even the tools designed to protect us are targets. Bitwarden, a widely adopted password manager, recently fell victim to a supply-chain attack. A malware-tainted Command Line Interface (CLI) release was published to npm, with Bitwarden confirming that 334 developers installed version 2026.4.0. This brief window of compromise, stemming from a hijacked GitHub account, potentially exposed credentials. The company stated vault data remained unaffected, but any breach involving credential exposure is a significant concern for users who trust these services with their most sensitive information.

Critical Vulnerabilities Demand Immediate Attention

The constant drumbeat of vulnerabilities continues. Microsoft rushed out out-of-band fixes for CVE-2026-40372, a critical ASP.NET Core privilege escalation flaw rated a severe 9.1. A bug within Data Protection versions 10.0.0 to 10.0.6 could allow attackers to forge cookies and antiforgery tokens, effectively impersonating users and achieving SYSTEM-level access on Linux or macOS deployments. For organizations running these platforms, this is not a patch to delay.

Apple, too, issued fixes for CVE-2026-28950 across iOS and iPadOS. This Notification Services bug had a disturbing capability: it retained deleted alerts, allowing for the recovery of sensitive message previews. Affecting numerous iPhone and iPad models, the flaw offered forensic access with device possession and has allegedly been used by law enforcement to gain access to incoming messages from encrypted apps. The erosion of message privacy, even through ostensibly fixed bugs, is a worrying trend.

Open-source tools, the backbone of much of today’s development, are not immune. LMDeploy, an open-source toolkit for deploying large language models, is affected by CVE-2026-33626, a high-severity server-side request forgery flaw. What’s alarming is the speed of exploitation; active attacks began within 13 hours of disclosure. Attackers are leveraging the image loader to access cloud metadata, probe internal services, and facilitate lateral movement within compromised networks.

And for those still clinging to legacy hardware: End-of-life D-Link DIR-823X routers are vulnerable to CVE-2025-29635, a remote code execution flaw. Akamai reported that attackers are actively exploiting this to deploy a Mirai-based botnet, conscripting these devices for denial-of-service attacks. Given that these models are end-of-life, patches are not expected, leaving a significant portion of the internet’s infrastructure perpetually exposed.

How Do Ransomware-as-a-Service Operations Work?

Beyond immediate breaches and vulnerabilities, the persistent threat of ransomware continues to evolve. Check Point Research has analyzed The Gentlemen ransomware-as-a-service (RaaS) operation. Emerging in 2025, this group provides encryptors for a wide array of systems—Windows, Linux, NAS, BSD, and ESXi. Their operation details a concerning underground recruitment pipeline, a leak site model for data exfiltration use, Tox-based negotiations, and the use of SystemBC proxy infrastructure for maintaining persistence and access. This is not a fringe operation; it’s a structured criminal enterprise.

Furthermore, sophisticated espionage campaigns are ongoing. Researchers mapped a Mustang Panda campaign targeting India’s banking sector and South Korean policy circles, deploying an updated LOTUSLITE backdoor. Their tactics include using HDFC-themed help files and fake banking pop-ups, along with leveraging DLL sideloading for malware installation. This level of targeted, persistent espionage highlights the geopolitical undercurrents in the cyber domain.

Finally, the supply chain remains a critical weak point. Researchers uncovered an attack that injected credential-stealing malware into Checkmarx developer tools on Docker Hub and Visual Studio Code, impacting KICS images downloaded over five million times. The malware’s objective is clear: collect cloud and developer credentials and propagate through compromised GitHub tokens. This hits at the very core of software development, jeopardizing trust and security from the ground up.


🧬 Related Insights

Maya Thompson
Written by

Threat intelligence reporter. Tracks CVEs, ransomware groups, and major breach investigations.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Check Point Research

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.