Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

After the Vercel Breach, Do You Know What Your AI Tools Can Access?

In April 2026, Vercel disclosed that attackers had accessed internal systems and customer credentials — not by breaking into Vercel directly, but by compromising a third-party AI tool one of its employees had connected to their corporate account.

No Off Season: Three Supply Chain Campaigns Hit npm, PyPI, and Docker Hub in 48 Hours

Three supply chain attacks hit npm, PyPI, and Docker Hub between April 21–23, 2026. All three targeted secrets: API keys, cloud credentials, SSH keys, and tokens from developer environments and CI/CD pipelines.

Fingerprinting AI Attacks: Detection Every SOC Needs

Revisiting a conversation between LimaCharlie co-founder Christopher Luft and Chris Cochran, Field CISO & Vice President of AI Security at SANS Institute, on The Cybersecurity Defenders Podcast. For most of cybersecurity’s history, defenders could operate under a safe assumption: somewhere on the other end of an attack, a human was making decisions. Scripts might automate parts of the kill chain, tools might accelerate execution, but a person was in the loop.

AI Receptionists and the Expanding Attack Surface: What Security Teams Need to Know

AI receptionists are quickly becoming the front line of customer interaction, handling calls, capturing data, and integrating directly with business systems. But as organizations rush to adopt AI-powered customer service, a critical question is emerging: Are we securing these systems as rigorously as we deploy them? Because every AI receptionist isn't just a convenience, it's also a new attack surface.

Obrela's 2025 Digital Universe Report highlights shift to stealthy, identity-driven cyberattacks

London, 21st April - Obrela has released its Digital Universe Report 2025, revealing a significant shift in the global cyber threat landscape as attackers move away from high-volume attacks toward more targeted, stealth-driven techniques focused on identity, access and persistence.

The OtterCookie Matryoshka

Over the past month, the cybersecurity community has published isolated reports detailing disparate attacks by the North Korean state-aligned threat group Shifty Corsair (also known as FAMOUS CHOLLIMA). While individual vendors have documented specific supply chain poisons or targeted spear-phishing campaigns, the Threat Fusion Cell (TFCTI) at BlueVoyant has synthesized these findings to reveal a much larger, coordinated offensive.

The April 2026 AI Security Report: 6 Incidents and Detailed Attack Paths

From AI agents leaking internal data to coordinated global malware campaigns — here is everything that happened in AI cybersecurity between April 7 and April 21, 2026, with detailed attack paths for each incident. The fifteen days following April 7, 2026 produced six distinct AI-related security incidents spanning internal data exposure, supply chain exploitation, autonomous malware generation, coordinated multi-vector attacks, model leak fallout, and documented AI agent control failures.

Ep 39: This is your first ransomware attack, not ours

On this episode of Masters of Data, we sat down with Steven Manley, CTO of Druva, to get the unfiltered truth about ransomware: it's not a matter of if you'll be breached, but when, and bad actors are now launching hundreds of attacks at a surprisingly low cost. We dig into why attackers lurk undetected for 200-plus days, how AI is being weaponized for everything from eerily convincing voice phishing to secretly training your own AI systems against you, and why your most protected assets are rarely what gets hit first.

China-linked group targets cloud, Russian cyber espionage, agentic AI systems flaw & Nginx [313]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

Attacking the MCP Trust Boundary

Every secure API draws a line between code and data. HTTP separates headers from bodies. SQL has prepared statements. Even email distinguishes the envelope from the message. The Model Context Protocol (MCP), the fast-growing standard for connecting AI agents to external services, inherits that gap from the models it sits on top of.