International Cyber Digest
4.71K subscribers
367 photos
19 videos
2 files
45 links
Your weekly go-to cybersecurity newsletter, curated and commented on by our senior analysts.
Download Telegram
🚨 The NSA has been confirmed to be using Anthropic's Mythos, despite Anthropic sitting on the DoD's blacklist.

Access to Mythos is restricted to just 40 organizations, with Anthropic citing offensive cyber capabilities too dangerous for wider release.

Source: https://www.axios.com/2026/04/19/nsa-anthropic-mythos-pentagon
😢13💩7🤬5
🚨 According to sample data we received from the Vercel breach, Vercel's CEO Guillermo Rauch was last seen on March 3, 2026. Who is running the company?

The threat actor told us Vercel's security was poor, and consistent with Vercel's own disclosure, a senior engineer authenticated with a fake third-party AI tool via its Google Workspace OAuth app.

- The breach appears to have started or ended on April 12, 2026
- We were sent records of all employees...
7🤣6🔥2
🚨🇫🇷 France's ANTS portal, the government system issuing IDs, passports, and driver's licenses, has been breached.

Up to 19 million French citizens may be affected. ANTS has confirmed the breach.

Exposed fields include full name, email, address, date and place of birth, phone number, and identity verification data. Confirmed by the Ministry of the Interior.
🤣13🎉10😁3😭3😍2🔥1
🚨‼️ A Dutch NATO ship escorting France's nuclear flagship carrier Charles de Gaulle was tracked via a cheap Bluetooth tracker, mailed to the vessel inside a greeting card by a Dutch TV station.

The Dutch military postal system missed the device entirely. The Ministry of Defense has now banned greeting cards with batteries.
1🤣424
🚨 The Vercel breach traces back to a Context[.]ai gooner employee infected with Lumma infostealer. The malware harvested his Google Workspace credentials, porn and anime site logins, and the in-game username "lecoonjames" (see profile pic below, he changed the username post-infection, I wonder why).

Stolen records included "support@context[.]ai," assessed as a core Context-Inc Vercel team account, likely enabling privilege escalation into Vercel infrastructure.
🤣302😱1😭1🤪1
‼️🇫🇷 The threat actor behind the ANTS breach told us he doesn't want any money, he just wanted to prove government systems are easy to hack.

ANTS was breached via an IDOR access control flaw. 80GB of passwords, source code, logs, and PII stolen.

We've seen the samples...
🥰14🔥5😁3🤔2🤬1
❗️ Interesting move from the French police: they posted on a breaches forum directly from a threat actor's account after they arrested him.
🤣8