Storylines
Track continuity across signals: what changed, what held, and what to keep watching next.
How to use: Track continuity → open one storyline → inspect the current sources and key turns.
- CERT Belgium advisoriesccb.belgium.be
- Critical flaw in Marimo Python notebook exploited within 10 hours of disclosureCSO Online
- Marimo - Pre-Auth Remote Code Execution via Terminal WebSocket Authentication BypassNCSC-FI - Vulnerabilities
Sorted by momentum. Use the chevron to expand a card. Use the action button for the full drawer.
No investment advice. Research signals and sources only. EarlyNarratives provides informational signals derived from public sources. It does not provide financial, legal, or tax advice.
Editorial weekly synthesis. Use the tracker below for continuity between issues.
German police identify leaders of REvil and GandCrab ransomware gangs
German Federal Police have unmasked two Russian nationals as the leaders behind the notorious GandCrab and REvil ransomware operations active between 2019 and 2021.
Details
- The arrests come after investigations into ransomware operations from 2019 to 2021.
- Recent law enforcement actions demonstrate increased focus on ransomware gangs.
- Public identification of suspects raises awareness of ransomware threat actors.
- Disrupting ransomware leadership can significantly reduce cyber extortion threats.
- Identifying key actors aids international law enforcement collaboration.
- Highlights ongoing efforts to combat major ransomware groups active in recent years.
Critical zero-day vulnerability in Fortinet FortiClient EMS actively exploited, emergency hotfix released
A critical vulnerability (CVE-2026-35616) in Fortinet's FortiClient Endpoint Management Server (EMS) has been actively exploited since late March 2026.
Details
- Exploitation has been observed since late March 2026, with multiple global agencies issuing urgent advisories.
- CISA's mandated remediation deadline of April 9, 2026, pressures organizations to act swiftly.
- No public exploit code yet, but expected soon, raising the risk of widespread attacks.
- The vulnerability enables remote code execution without authentication, risking full compromise of endpoint management.
- Active exploitation and imminent proof-of-concept increase the urgency for immediate patching.
- FortiClient EMS is widely used for endpoint security management, so the impact is broad and critical.
Credential monitoring gaps and recurring incidents raise hidden security costs
Recent analysis reveals that relying solely on breach monitoring is insufficient to combat credential-based attacks due to a critical gap between detection by security operations centers (SOC) and identity and access management (IAM) response processes such as session...
Details
- Recent reports highlight persistent challenges in credential security management.
- Organizations face rising costs from repeated credential incidents despite breach prevention efforts.
- Improving handoff between detection and identity response teams is critical for timely mitigation.
- Credential-based attacks exploit gaps between detection and response, increasing breach risk.
- Recurring credential incidents cause ongoing financial and operational impacts beyond initial breaches.
- Effective security requires coordinated SOC and IAM processes, not just monitoring tools.
Track what changed, what held, and what to watch next across recent runs. Sorted by momentum.
Chromium: CVE-2026-5893 Race in V8
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2026) for more information.
Details
IBM security advisory (AV26-342)
Serial number: AV26-342 Date: April 13, 2026 Between April 6 and 12, 2026, IBM published security advisories to address vulnerabilities in multiple products. Included were critical updates for the following: DevOps Test Performance – versions 11.0 to 11.0.7 EDB PGAI – multiple versions and models EDB PGAI Databases – version 18.0 IBM App Connect Operator – multiple versions IBM App Connect Enterpr
Details
Warning: High Severity vulnerability in Apache ActiveMQ, Patch Immediately!
CCB Advisories
Details
Google Rolls Out Cookie Theft Protections in Chrome
New Device Bound Session Credentials render stolen session cookies unusable by cryptographically binding authentication. The post Google Rolls Out Cookie Theft Protections in Chrome appeared first on SecurityWeek .
Details
OpenAI’s Mac apps needs an update thanks to the Axios hack
OpenAI updated its security certificates and is requiring all macOS users to update to the latest versions after determining its products, along with many others, were impacted by a widespread supply-chain attack that briefly infected a popular open-source library in late March, the company said in a blog post Friday. The artificial intelligence vendor said it “found no evidence that OpenAI user d
Details
FBI Dismantles $20m Phishing Operation W3LL
The W3LL phishing kit has been associated with fraud attempts totaling $20m
Details
On Anthropic’s Mythos Preview and Project Glasswing
The cybersecurity industry is obsessing over Anthropic’s new model, Claude Mythos Preview, and its effects on cybersecurity. Anthropic said that it is not releasing it to the general public because of its cyberattack capabilities, and has launched Project Glasswing to run the model against a whole slew of public domain and proprietary software, with the aim of finding and patching all the vulnerab
Details
Google Warns of New Threat Group Targeting BPOs and Helpdesks
Google’s threat intel team warns UNC6783, a new extortion group possibly linked to the “Raccoon” persona, is targeting BPOs and enterprises
Details
Atomic Stealer MacOS ClickFix Attack Bypasses Apple Security Warnings
macOS 26.4 update introduced security warnings into Terminal to prevent ClickFix attacks, so attackers have shifted to Script Editor instead
Details
Mitel security advisory (AV26-328)
Serial number: AV26-328 Date: April 8, 2026 On April 7, 2026, Mitel published a security advisory to address vulnerabilities in the following product: MiCollab - version 10.2.0.24 and prior The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates. Mitel Product Security Advisory MISA-2026-0002 Mitel Security Bulletins
Details
Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Region
An apparent hack-for-hire campaign likely orchestrated by a threat actor with suspected ties to the Indian government targeted journalists, activists, and government officials across the Middle East and North Africa (MENA), according to findings from Access Now, Lookout, and SMEX. Two of the targets included prominent Egyptian journalists and government critics, Mostafa
Details
Free gives current signals and storylines with source links. Upgrade for archive, alerts, watchlists, exports, API, and workflow tools.