Live Threat Pulse
0 Critical CVEs
50 KEV Entries
16 Threat Feeds
Updated: 16 Apr 2026, 19:08 UTC

Thursday, 16 April 2026

Zero-Day Barrage and Supply Chain Sabotage Define Chaotic Patch Tuesday

A staggering 167 Microsoft vulnerabilities, a critical Windows Defender zero-day, and a massive WordPress plugin supply chain attack have created a perfect storm for defenders on this April Patch Tuesday. The sheer volume of critical fixes, combined with active exploitation of both new and legacy flaws, demands immediate and strategic action from security teams worldwide.

The Patch Tuesday Avalanche

Microsoft’s April 2026 Patch Tuesday is one for the record books, addressing 167 CVEs across its ecosystem. Among these are two zero-days: CVE-2026-XXXXX, a publicly disclosed flaw in Windows Defender dubbed “BlueHammer,” and a separate zero-day in SharePoint Server. The scale of this update is immense, requiring careful prioritization to avoid overwhelming IT teams. As detailed by KrebsOnSecurity, the Defender vulnerability is particularly concerning as it could allow attackers to disable or manipulate the built-in security tool. Separately, Google also patched its fourth zero-day in Chrome this year, underscoring the relentless pace of browser-targeted attacks.

Supply Chain Sabotage Hits WordPress Ecosystem

In a brazen act of supply chain sabotage, a threat actor spent an estimated $100,000 to purchase a massive collection of WordPress plugins and planted a backdoor in all of them. This campaign, reported by Fireship, represents a catastrophic failure of the plugin marketplace model, potentially compromising millions of websites in one fell swoop. The incident has prompted CloudFlare to step in with “EmDash,” a forked alternative to WordPress that promises to overhaul plugin security. This event is a stark reminder that third-party code repositories are high-value targets for attackers seeking maximum impact with minimal effort.

Legacy Flaws and Novel Botnets Fuel Active Campaigns

While new vulnerabilities grab headlines, attackers continue to profit from old ones. Russian military intelligence hackers are mass harvesting Microsoft Office authentication tokens by exploiting known flaws in older Internet routers, as reported by KrebsOnSecurity. This campaign bypasses modern endpoint defenses by attacking the network perimeter. Simultaneously, a novel botnet dubbed “PowMix” is targeting the Czech workforce. Discovered by Cisco Talos, PowMix uses randomized C2 beaconing to evade detection and has been active since at least December 2025. Furthermore, Iranian APT actors are actively exploiting programmable logic controllers (PLCs) across US critical infrastructure, according to a CISA advisory, highlighting the direct threat to operational technology.

AI’s Double-Edged Sword in Security

The role of AI in cybersecurity is becoming more pronounced and complex. On the defensive side, Google is expanding its use of Gemini AI models to detect and block malicious advertisements on its platforms. Offensively, threat actors are leveraging AI tools to enhance social engineering, as seen in a sophisticated macOS intrusion campaign by North Korea’s Sapphire Sleet, detailed by Microsoft. The campaign abuses user-driven execution and social engineering to bypass macOS protections. Additionally, defenders must now scan for exposed AI model credentials, as these have become a new attack surface for credential harvesting and model hijacking.

Prioritize patching the Windows Defender zero-day (CVE-2026-XXXXX) and the SharePoint Server zero-day above all other Microsoft updates this cycle; delay risks immediate compromise. Immediately audit all WordPress sites for plugins purchased or updated in the last 90 days, assume compromise, and begin migration plans for critical sites away from vulnerable plugin architectures. Finally, segment and monitor all Internet-facing OT devices, especially PLCs, and apply available patches for legacy routers to disrupt token-harvesting campaigns targeting Microsoft 365 credentials.

Immediate Actions
  • Immediately deploy patches for the Windows Defender 'BlueHammer' zero-day (CVE-2026-XXXXX) and SharePoint Server zero-day before any other updates.
  • Conduct an emergency audit of all WordPress plugins for recent purchases or updates and initiate incident response procedures.
  • Apply available firmware updates to legacy internet-facing routers and segment operational technology networks from corporate IT.

Further Reading

From the Feeds

Cisco Talos

The Q1 vulnerability pulse

Thor provides an overview of the Q1 2026 vulnerability statistics, highlighting key trends in legacy CVEs and the evolving impact of AI on the threat landscape.

The Hacker News

Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic

Cybersecurity researchers have warned of an active malicious campaign that's targeting the workforce in the Czech Republic with a previously undocumented …

BleepingComputer

Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face

Hackers are exploiting a critical vulnerability in Marimo reactive Python notebook to deploy a new variant of NKAbuse malware hosted on Hugging Face Spaces. …

Microsoft Security

Building your cryptographic inventory: A customer strategy for cryptographic posture management

Learn how to build a comprehensive cryptographic inventory and strengthen quantum‑safe readiness using Microsoft Security tools, best‑practice lifecycle models, …

BleepingComputer

Google expands Gemini AI use to fight malicious ads on its platform

Google says it is increasingly using its Gemini AI models to detect and block harmful ads on its advertising platforms, as scammers and threat actors continue …

Microsoft Security

Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise

The Microsoft Defender Security Research Team uncovered a sophisticated macOS intrusion campaign attributed to the North Korean threat actor Sapphire Sleet that …

The Hacker News

ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories

You know that feeling when you open your feed on a Thursday morning and it's just... a lot? Yeah. This week delivered. We've got hackers getting …

Rapid7

ClickFix Phishing Campaign Masquerading as a Claude Installer

OverviewIt is no secret that phishing campaigns utilizing various ClickFix techniques have been a commonly used method of social engineering. One of the main …