Cybersecurity Radar — 2026-04-04
March 2026 closed as the most active month for ransomware yet, with 780 confirmed attacks — a 13% spike over February — even as nation-state actors quietly intensify pressure on critical infrastructure. Hackers are actively exploiting CVE-2025-55182 in Next.js to breach hosts at scale and steal credentials, while Cisco has patched critical authentication-bypass flaws affecting multiple products. Meanwhile, stolen credentials continue to fuel both financially motivated and nation-state intrusions across every sector.
Cybersecurity Radar — 2026-04-04
🔴 Critical Alerts
CVE-2025-55182: Mass Exploitation of Next.js Apps — 766 Hosts Compromised
Attackers are actively exploiting CVE-2025-55182 in Next.js-powered web applications, breaching at least 766 hosts to steal credentials and stage follow-on attacks. The flaw enables mass credential exfiltration, with targeted intrusions reportedly building on the initial access gained. Organizations running Next.js in production should audit exposed instances immediately and apply available patches or mitigations.
Who's affected: Any organization hosting Next.js applications exposed to the internet. Severity: Critical — active exploitation confirmed at scale. Recommended action: Patch immediately; audit access logs for anomalous authentication activity; rotate credentials for any affected systems.

Cisco Patches Critical and High-Severity Flaws — Authentication Bypass Risk
Cisco has released fixes for a set of critical and high-severity vulnerabilities that could allow unauthenticated attackers to bypass authentication, execute arbitrary code, and access sensitive data across affected products. Details on the full scope of affected platforms are still emerging, but organizations running Cisco enterprise networking and security gear should prioritize patching.
Who's affected: Enterprises running Cisco networking and security products. Severity: Critical — code execution and authentication bypass possible without credentials. Recommended action: Apply Cisco security updates immediately; review advisories for affected product versions; monitor for anomalous access patterns.
Threat Landscape
Ransomware Hits Record High in March 2026: 780 Attacks
March 2026 saw ransomware volume surge to 780 confirmed attacks — the highest monthly total of the year so far and a 13% increase over February's 692. The spike underscores a continuing acceleration in ransomware activity in the first quarter of 2026, with threat actors showing no sign of slowing operations.

Stolen Credentials Fueling Everything from Ransomware to Nation-State Ops
A SecurityWeek analysis published this week highlights how stolen login credentials have become the universal enabler for both financially motivated cybercriminals and nation-state actors. The convergence is blurring the line between espionage and criminal activity. Notably, the financially motivated actor Shai-Hulud has been observed targeting victim home directories for deletion when little data of value is found — a destructive tactic more commonly associated with nation-state operations. The report underscores how increased geopolitical tension has reduced the boundaries between criminal and state-sponsored hacking.
CYFIRMA Weekly Intelligence: Ransomware Trends and Threat Actor Activity
CYFIRMA's Weekly Intelligence Report (dated April 3, 2026) highlights current ransomware group trends and evolving threat actor behaviors observed across monitored infrastructure and underground forums. The report covers shifts in tactics, techniques, and procedures (TTPs) across active ransomware gangs as they adapt to defensive improvements and law enforcement pressure.

APT28 Exploiting Microsoft Office Flaw Against Government and Military Targets
Recent threat intelligence from The Cyber Express documents activity consistent with Russian threat group APT28 targeting government and military entities using a Microsoft Office vulnerability tracked as CVE-2026-21509. Telecom networks — documented by Cyble as suffering 444 security incidents and 90 ransomware attacks in 2025 alone — remain a key surveillance layer for nation-state operations. Although published slightly before our 24-hour window, ongoing APT28 activity tied to this CVE warrants close monitoring.
Vulnerabilities & Patches
CVE-2025-55182 — Next.js Remote Credential Theft (Critical, Actively Exploited)
Attackers are mass-exploiting this flaw to breach Next.js application hosts at scale. At least 766 confirmed victims, with follow-on targeted attacks leveraging stolen credentials. Patch or mitigate immediately.
Cisco Critical Flaws — Authentication Bypass, Remote Code Execution
Cisco has patched critical and high-severity vulnerabilities enabling authentication bypass, arbitrary code execution, and access to sensitive data. Affected products span Cisco's enterprise portfolio. Full product list available in Cisco's security advisories.
CVE-2026-3502 — TrueConf Zero-Day Exploited Against Southeast Asian Governments (CVSS 7.8)
A zero-day in TrueConf conferencing software (CVE-2026-3502, CVSS 7.8) was exploited in early 2026 via malicious software updates, enabling deployment of Havoc malware across Southeast Asian government networks. While patched, organizations running TrueConf should verify update integrity and hunt for signs of Havoc deployment.
Breaches & Incidents
March 2026: A Month of Major Cyber Attacks Across Sectors
CM-Alliance's roundup of March 2026 cyber attacks and data breaches documents major incidents across healthcare, government, financial services, and critical infrastructure. The report highlights the broad sectoral impact of ransomware campaigns and targeted intrusions during what proved to be a record month for attack volume.
.webp)
CSIS Significant Cyber Incidents Timeline — Updated Through April 2026
The Center for Strategic and International Studies (CSIS) has updated its running timeline of significant cyber incidents, tracking state actions, espionage campaigns, and high-impact cyberattacks with losses exceeding $1 million. The living document provides ongoing reference for major incidents affecting governments and critical infrastructure globally.
Industry & Policy
Nation-State Shift Masks Ransomware Slowdown in Critical Infrastructure
Waterfall Security's Threat Report 2026 (published last week) warns that a surface-level slowdown in ransomware against industrial environments is masking a deeper and more dangerous trend: an escalation of nation-state attacks on critical infrastructure. While criminal ransomware groups are optimizing operations, state-sponsored actors are increasing their targeting of operational technology (OT) environments — a shift with potentially catastrophic physical consequences if left unaddressed.
SecurityWeek Analysis: Identity Is the New Perimeter — And Attackers Know It
A SecurityWeek report published this week reinforces that the convergence of criminal and nation-state tactics is reshaping the threat landscape. Organizations face adversaries who freely reuse stolen credentials across both espionage and ransomware operations, making identity security the most urgent defensive priority for 2026.
CYFIRMA Intelligence: Ransomware Actors Adapting TTPs in Response to Defenses
CYFIRMA's April 3 weekly intelligence report notes that ransomware actors are actively adapting their TTPs as organizations improve defenses and law enforcement maintains pressure. The report recommends organizations monitor threat intelligence feeds closely to track group-specific behavioral shifts.
What to Watch
- Next.js CVE-2025-55182 blast radius: With 766 hosts already confirmed compromised, incident responders should expect credential-stuffing campaigns leveraging the stolen logins in coming days; monitor authentication anomalies across all platforms.
- Ransomware Q1 trajectory: March's record 780 attacks suggests Q1 2026 will be the highest-volume quarter on record — watch for Q1 retrospectives from major threat intelligence vendors that may surface previously unreported incidents.
- Nation-state OT escalation: Waterfall's report signals that quieter ransomware numbers in ICS/OT environments may mask deeper nation-state pre-positioning — organizations in energy, water, and manufacturing should audit OT network segmentation urgently.
Reader Action Items
-
Patch CVE-2025-55182 in all Next.js deployments now — exploitation is active and widespread; rotate credentials on any host that may have been exposed, and audit downstream systems for unauthorized access using stolen credentials.
-
Apply Cisco security updates immediately — review Cisco's latest advisories for your specific product versions, prioritizing internet-facing and authentication-critical systems vulnerable to the newly patched critical flaws.
-
Audit identity and credential hygiene across your organization — given that stolen credentials are now the single most common initial access vector for both ransomware and nation-state actors, enforce MFA universally, review privileged account access, and deploy credential monitoring solutions to detect compromised logins before attackers weaponize them.
This content was collected, curated, and summarized entirely by AI — including how and what to gather. It may contain inaccuracies. Crew does not guarantee the accuracy of any information presented here. Always verify facts on your own before acting on them. Crew assumes no legal liability for any consequences arising from reliance on this content.
Create your own signal
Describe what you want to know, and AI will curate it for you automatically.
Create Signal