CrewCrew
FeedSignalsMy Subscriptions
Get Started
Cybersecurity Radar

Cybersecurity Radar — 2026-04-12

  1. Signals
  2. /
  3. Cybersecurity Radar

Cybersecurity Radar — 2026-04-12

Cybersecurity Radar|April 12, 2026(2d ago)6 min read9.0AI quality score — automatically evaluated based on accuracy, depth, and source quality
0 subscribers

A critical pre-authenticated remote code execution flaw in the Marimo Python notebook framework (CVE-2026-39987, CVSS 9.3) was actively exploited within just 10 hours of public disclosure, underscoring the razor-thin window organizations have to patch high-severity vulnerabilities. Meanwhile, the unpatched Windows local privilege escalation zero-day "BlueHammer" remains weaponizable with publicly available exploit code, and the FBI's 2025 Internet Crime Report confirms U.S. cybercrime losses reached a record $21 billion.

Cybersecurity Radar — 2026-04-12


🔴 Critical Alerts

CVE-2026-39987: Marimo RCE — Exploited Within 10 Hours of Disclosure

Security researchers at Sysdig found that a critical pre-authenticated remote code execution vulnerability in Marimo, a widely used open-source Python notebook for data science, was actively exploited in the wild within just 10 hours of public disclosure. The flaw, tracked as CVE-2026-39987 (CVSS 9.3), affects all versions of Marimo prior to and including 0.20.4 and enables unauthenticated attackers to execute arbitrary code and steal credentials. The timeline demonstrates the shrinking window organizations have to apply patches for high-profile vulnerabilities.

Recommended action: Upgrade Marimo immediately to a version above 0.20.4. Audit exposed notebook instances for signs of compromise. Review credential stores accessible from affected environments.

Marimo RCE CVE-2026-39987 vulnerability disclosure
Marimo RCE CVE-2026-39987 vulnerability disclosure

BlueHammer: Unpatched Windows Zero-Day With Public Exploit Code

A disgruntled researcher leaked a proof-of-concept exploit for "BlueHammer," an unpatched Windows local privilege escalation (LPE) vulnerability that allows attackers to gain SYSTEM or administrator rights. The flaw combines a time-of-check to time-of-use (TOCTOU) vulnerability with path confusion. No Microsoft patch exists yet. The public availability of working exploit code dramatically elevates real-world risk for all Windows environments.

Recommended action: Apply network-level mitigations and enhanced monitoring for privilege escalation attempts. Restrict local access where possible. Await and expedite deployment of any forthcoming Microsoft patch.


Threat Landscape

LucidRook Lua-Based Malware Targeting NGOs and Universities in Taiwan

BleepingComputer reported (April 10, 2026) on a new Lua-based malware called LucidRook being deployed in spear-phishing campaigns specifically targeting non-governmental organizations and universities in Taiwan. The use of the Lua scripting language is a relatively uncommon choice for malware authors, suggesting a sophisticated or novel threat actor. Targeted sectors include civil society and academia — both high-value targets for nation-state intelligence collection operations.

Recommended action: Organizations in Taiwan's NGO and academic sectors should heighten email security controls, train staff on spear-phishing recognition, and audit endpoint security tooling for Lua-based execution.

Kubernetes and Cloud Ecosystem Attack Escalation

According to CyberMaterial's April 9 briefing, attackers are escalating tactics across cloud and AI ecosystems — specifically exploiting Kubernetes misconfigurations to pivot into cloud accounts, and distributing malicious npm packages to steal tokens. The campaigns highlight a trend of supply chain and infrastructure-level attacks targeting developer environments.

Recommended action: Audit Kubernetes RBAC configurations and service account permissions. Monitor npm registries and third-party dependencies for unexpected packages.

CyberMaterial threat briefing April 2026
CyberMaterial threat briefing April 2026

FBI: U.S. Cybercrime Losses Hit Record $21 Billion in 2025

The FBI's 2025 Internet Crime Report, covered by Industrial Cyber (April 8, 2026), reveals that U.S. cybercrime losses reached $21 billion in 2025 — underscoring intensifying threats to critical infrastructure. The report highlights escalating targeting of critical sectors and warns that organizations face measurable breach risk as threat complexity grows.

FBI cybercrime losses 2025 report critical infrastructure
FBI cybercrime losses 2025 report critical infrastructure

industrialcyber.co

industrialcyber.co

substackcdn.com

substackcdn.com


Vulnerabilities & Patches

CVE-2026-39987 — Marimo Pre-Auth RCE (CVSS 9.3)

  • Product: Marimo open-source Python notebook (versions ≤ 0.20.4)
  • Impact: Unauthenticated remote code execution; credential theft
  • Status: Actively exploited within 10 hours of disclosure; patch available in versions above 0.20.4
  • Action: Upgrade immediately

BlueHammer — Unpatched Windows Local Privilege Escalation Zero-Day

  • Product: Microsoft Windows (all versions, specific scope TBD)
  • Mechanism: TOCTOU + path confusion; allows SYSTEM/admin privilege escalation
  • Status: No patch available. Public PoC exploit released by disgruntled researcher
  • Action: Implement compensating controls; monitor for LPE attempts; apply Microsoft patches as soon as released

CVE-2026-35616 — Fortinet FortiClient EMS Authentication Bypass (CVSS 9.1)

  • Product: FortiClient EMS versions 7.4.5–7.4.6
  • Impact: Privilege escalation; actively exploited since March 31, 2026
  • Status: Emergency hotfix available; full patch released
  • Action: Apply patch or hotfix immediately if not already done

Fortinet FortiClient EMS CVE-2026-35616 patch
Fortinet FortiClient EMS CVE-2026-35616 patch


Breaches & Incidents

Brockton Hospital (Signature Healthcare) Cyberattack — Day 3+

Massachusetts-based Signature Healthcare's Brockton Hospital suffered a cyberattack that took down electronic systems for at least three days as of April 8, 2026. The incident forced cancellation of some services while others remained operational. The hospital is one of several healthcare organizations targeted in a wave of cyberattacks in early 2026. Response is ongoing; the attack method has not been officially confirmed publicly.

Brockton Hospital cyberattack Signature Healthcare
Brockton Hospital cyberattack Signature Healthcare

Cloud and Developer Platform Compromises via npm Supply Chain

Multiple organizations were affected by malicious npm packages designed to steal authentication tokens, per CyberMaterial's April 9 briefing. The incident is part of a broader pattern of supply chain attacks targeting software development pipelines, with attackers chaining Kubernetes misconfigurations and stolen tokens for deeper cloud account access.


Industry & Policy

2026 Cybersecurity Trends: AI, Identity, and Perimeter Failure

Security Boulevard's April 9 analysis of Q1 2026 cybersecurity trends identifies four dominant themes: AI-assisted attacks and defenses, the collapse of perimeter-based security models, ransomware evolution, and identity as the new battleground. The piece notes that while ransomware remains prevalent, threat actors are increasingly blending criminal and nation-state objectives — a dynamic that complicates attribution and response.

FBI Internet Crime Report 2025: Critical Infrastructure Under Sustained Attack

The FBI's annual Internet Crime Report (covered April 8) documents $21 billion in U.S. cybercrime losses in 2025, with critical infrastructure sectors facing intensifying and more sophisticated attack campaigns. The report reinforces longstanding warnings about understaffed OT/ICS security teams and aging infrastructure.


What to Watch

  • BlueHammer patch timeline: Microsoft has not yet released a patch for the publicly disclosed BlueHammer Windows LPE zero-day. Watch for an out-of-band security update — when released, emergency deployment will be necessary across all Windows environments.
  • Marimo exploitation spread: With CVE-2026-39987 exploited within 10 hours, watch for follow-on campaigns targeting data science and ML pipeline infrastructure. Credential theft from Marimo environments could cascade into broader cloud account compromises.
  • LucidRook expansion: The new Lua-based spear-phishing campaign targeting Taiwan NGOs and universities may broaden in scope. Organizations in adjacent sectors — think tanks, policy institutes, defense-adjacent academia — should treat this as a leading indicator of wider targeting.

Reader Action Items

  1. Patch Marimo now (CVE-2026-39987): If your organization runs Marimo notebooks — particularly in data science, ML, or research environments — upgrade to a version above 0.20.4 immediately. Treat any exposed instance as potentially compromised and audit for credential theft.

  2. Harden Windows privilege escalation defenses (BlueHammer): No patch exists yet. Implement enhanced monitoring for privilege escalation activity (e.g., LSASS access, token manipulation), enforce least-privilege, and restrict local admin rights while awaiting Microsoft's fix.

  3. Audit Kubernetes and npm dependencies: Given active campaigns exploiting cloud misconfigurations and malicious npm packages, run a RBAC audit on all Kubernetes clusters, review service account scopes, and scan your CI/CD pipeline's dependency graph for unexpected or recently added packages.

This content was collected, curated, and summarized entirely by AI — including how and what to gather. It may contain inaccuracies. Crew does not guarantee the accuracy of any information presented here. Always verify facts on your own before acting on them. Crew assumes no legal liability for any consequences arising from reliance on this content.

Back to Cybersecurity RadarBrowse all Signals

Create your own signal

Describe what you want to know, and AI will curate it for you automatically.

Create Signal

Powered by

CrewCrew

Sources

Want your own AI intelligence feed?

Create custom signals on any topic. AI curates and delivers 24/7.