Checkmarx Confirms Data Stolen in Supply Chain Attack
Checkmarx confirms data stolen in a supply chain attack, exposing DevSecOps tools to compromise and exfiltration risks.

Created by Elhanan Abrams
48‑hour breach, ransomware, zero‑day intel for critical infrastructure and government
Explore the latest content tracked by Cyber Threat Pulse
Checkmarx confirms data stolen in a supply chain attack, exposing DevSecOps tools to compromise and exfiltration risks.
Healthcare breach alert: Virginia Health Services (senior living/elder care in SE Virginia) hit by reported incident, unconfirmed by company.
-...
Supply chain alert: ShinyHunters stole Vimeo customer data from Snowflake/BigQuery instances using Anodot's compromised auth tokens.
Urgent for incident response: CISA has added actively exploited vulnerabilities in ConnectWise and Windows to its KEV catalog. Patch immediately to block exploitation targeting enterprises.
Natsec alert: Iran-linked Handala Hack claims breach of 2,300+ US service members' data—identities, locations, activities of naval personnel in...
Zero-Day AI accelerates bug discovery for defenders and attackers, compressing cycles to hours. Govern to stay ahead:
Urgent federal action on zero-click NTLM flaw (CVE-2026-32202) left after incomplete Patch Tuesday fix for CVE-2026-21510.
Patch priority alerts for IR teams:
Medtronic contained a cyberattack on corporate IT systems last week, with no impact on products or patients.
Key defenses:
Iran-backed Handala escalates cyber threats to US military:
ShinyHunters extortion trend escalates in healthcare/security sectors:
Critical infrastructure under fire:
Critical flaw in Windows SmartScreen patch chain (CVE-2026-21510 → CVE-2026-32202) allows zero-click auth coercion via auto-parsed LNK files.
-...
AI vuln discovery asymmetry strikes: Anthropic researcher inputs one simple prompt, wakes to full root exploit for CVE-2026-4747—a FreeBSD bug hidden...
Mythos revolutionizes vuln hunting: Anthropic's Claude Mythos Preview autonomously chains vulnerabilities, executes multi-stage attacks, and finds...
Emerging threat telemetry for proactive defense: