NewsDigest

Vercel breached via compromised third‑party AI tool

🏷️ Cybersecurity🌍 United States🔥 Trending🔗 14 sources54Digest ScoreiThis score reflects the story's reliability, bias neutrality, and public momentum.
Vercel breached via compromised third‑party AI tool

📰 Full Story

Vercel, the U.S. cloud platform behind Next.js, disclosed a security incident on April 19–20, 2026 after attackers used a compromised third‑party AI application's Google Workspace OAuth credentials to access internal systems. The company said a limited subset of customers had credentials exposed after an attacker gained access to Vercel environments and enumerated environment variables that were not flagged as “sensitive.” Vercel published an indicator-of-compromise (OAuth client ID 110671459871-30f1spbu0hptbs60cb4vsmv79i7bbvqj.apps.googleusercontent.com) and said it is working with Google‑owned Mandiant, other cybersecurity firms and law enforcement. Context.ai — the third‑party AI tool implicated — has acknowledged an earlier March AWS incident and likely OAuth token compromise. A threat actor claiming to be ShinyHunters posted data for sale and asked about $2 million, but Vercel says its open‑source projects (Next.js, Turbopack) remain safe and that “sensitive” environment variables, which are encrypted at rest, show no evidence of access. Vercel has contacted impacted customers and urged rotation of unprotected secrets, review of activity logs, and tighter OAuth and environment‑variable protections.

Vercel breached via third‑party AI OAuth token

🏷️ Cybersecurity🌍 United States🔥 Trending🔗 19 sources33Digest ScoreiThis score reflects the story's reliability, bias neutrality, and public momentum.
Vercel breached via third‑party AI OAuth token

📰 Full Story

Vercel, the U.S. cloud platform behind Next.js, disclosed a security incident on April 19–20, 2026 after attackers gained access to parts of its internal Google Workspace and non‑sensitive environment variables via a compromised third‑party AI tool, Context.ai. Vercel said the breach affected a “limited subset” of customers and that environment variables flagged as “sensitive” (encrypted at rest) show no evidence of being read. Multiple cybersecurity outlets reported a threat actor — using a ShinyHunters alias — offering alleged Vercel data and employee records for $2 million. Vercel has engaged incident‑response firms including Mandiant, notified law enforcement and encouraged affected customers to rotate credentials, audit activity logs and enable sensitive variable protections. Independent researchers and vendors have suggested the compromise followed an infostealer infection at Context.ai that exposed OAuth tokens; Vercel says its services and open‑source projects (Next.js, Turbopack) remain operational and, so far, intact.

🤝 Social Media Insights

Social Summary
1 / 5
The breach stemmed from OAuth tokens stolen via a Lumma Stealer infection at Context.ai, giving attackers Workspace access that exposed non‑sensitive env vars; Vercel says sensitive vars and OSS projects are intact. Customers should audit OAuth grants and rotate credentials immediately.

OpenAI launches GPT-5.4-Cyber, expands TAC access

🏷️ Cybersecurity🌍 United States🔗 4 sources29Digest ScoreiThis score reflects the story's reliability, bias neutrality, and public momentum.
OpenAI launches GPT-5.4-Cyber, expands TAC access

📰 Full Story

OpenAI on April 20, 2026 unveiled GPT-5.4-Cyber, a variant of its GPT-5.4 model fine-tuned for defensive cybersecurity tasks, and said it is scaling its Trusted Access for Cyber (TAC) programme to thousands of verified individuals and hundreds of teams. The model is described as more "cyber-permissive," lowering refusal thresholds for legitimate defensive prompts such as vulnerability discovery, binary reverse engineering and incident response, while remaining subject to usage policies and deployment constraints (including limits around zero-data-retention environments). OpenAI said it is committing support — including API credit commitments tied to its Cybersecurity Grant Program — and has onboarded large enterprises and security vendors and is working with standards bodies including the U.S. Center for AI Standards and Innovation and the UK AI Security Institute. The company framed the rollout as iterative and identity‑verified, with strong KYC and verification controls to reduce misuse. The move follows previews of rival frontier models such as Anthropic’s Mythos and sits within a wider industry push to embed frontier AI into defensive workflows while guarding against dual-use risks.

Nexcorium Mirai Variant Hijacks TBK DVRs

🏷️ Cybersecurity🔗 3 sources5Digest ScoreiThis score reflects the story's reliability, bias neutrality, and public momentum.
Nexcorium Mirai Variant Hijacks TBK DVRs

📰 Full Story

Security vendors on April 18, 2026, warned of a new Mirai-family botnet called Nexcorium that exploits a command-injection flaw (CVE-2024-3721) in TBK DVR models — primarily DVR-4104 and DVR-4216 — to build large-scale DDoS botnets. Fortinet FortiGuard Labs and other researchers found attackers delivering a downloader script that fetches multi-architecture payloads (ARM, MIPS, x86-64), then establishes persistence via modifications to /etc/inittab, /etc/rc.local, systemd services and cron jobs. Nexcorium embeds XOR-encoded configuration data, supports multiple flood types (UDP, TCP SYN/ACK, SMTP and others), includes brute-force Telnet credentials and reuses older exploits such as CVE-2017-17215 to broaden its reach. Unit 42 and others also observed scans targeting end-of-life TP‑Link routers; CISA had previously listed related flaws in its Known Exploited Vulnerabilities catalogue. Researchers note the campaign bears markers referencing a so‑called “Nexus Team.” Organisations are advised to patch or decommission vulnerable devices, remove default credentials, apply network segmentation and monitor for abnormal outbound connections to known C2 domains.

Scottish man pleads guilty in $8m crypto hack

🏷️ Cybersecurity🌍 United States🔥 Trending🔗 3 sources3Digest ScoreiThis score reflects the story's reliability, bias neutrality, and public momentum.
Scottish man pleads guilty in $8m crypto hack

📰 Full Story

Tyler Robert Buchanan, 24, of Dundee, Scotland, pleaded guilty in the U.S. Central District of California to conspiracy to commit wire fraud and aggravated identity theft for his role in a phishing campaign that stole at least $8 million in virtual currency. Prosecutors say Buchanan and co‑conspirators ran the scheme from September 2021 to April 2023, sending hundreds of spoofed text messages that directed employees to fraudulent websites and captured login credentials. Stolen credentials and cryptocurrency seed phrases were reportedly shared on a Telegram channel administered by Buchanan. Court documents say the group targeted telecoms, IT suppliers, cloud communications firms, virtual asset companies and individuals — impacting at least a dozen companies and, in some filings, as many as 45 victims across the United States, Canada, India and the United Kingdom. Police Scotland assisted the FBI. Buchanan has been in U.S. custody since April 2025 and faces a maximum sentence of 22 years at a sentencing hearing set for Aug. 21. Several alleged co‑conspirators remain charged in U.S. courts; one has already pleaded guilty and been sentenced.

Supreme Court hacker sentenced to probation

🏷️ Cybersecurity🌍 United States🔗 4 sources3Digest ScoreiThis score reflects the story's reliability, bias neutrality, and public momentum.
Supreme Court hacker sentenced to probation

📰 Full Story

Nicholas Moore, a 25-year-old Tennessee man who admitted repeatedly accessing the U.S. Supreme Court’s electronic filing system and the networks of AmeriCorps and the Department of Veterans Affairs, was sentenced to 12 months of probation on April 17, 2026. Moore pleaded guilty in January to a misdemeanor count of fraud and related activity in connection with computers, admitting he used stolen login credentials to view and sometimes post victims’ personal information to an Instagram account called @ihackedthegovernment. Prosecutors said he accessed the Supreme Court e-filing account on more than 25 days in 2023 and revealed details from other federal systems, including phone numbers and medical data, but reported no financial losses. The Justice Department recommended probation rather than incarceration, characterizing Moore as a “vulnerable young man” with long-term disabilities; prosecutors had sought up to 36 months of probation while the defense sought 12 months. U.S. District Judge Beryl Howell imposed the 12-month probation term and did not order prison time or fines at sentencing.
Explore more on NewsDigest