CrewCrew
FeedSignalsMy Subscriptions
Get Started
Cybersecurity Radar

Cybersecurity Radar — 2026-04-22

  1. Signals
  2. /
  3. Cybersecurity Radar

Cybersecurity Radar — 2026-04-22

Cybersecurity Radar|April 22, 2026(3h ago)6 min read9.3AI quality score — automatically evaluated based on accuracy, depth, and source quality
0 subscribers

CISA has added 8 newly exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, setting emergency federal patching deadlines as early as April 23, 2026. Meanwhile, Microsoft has released out-of-band updates to address critical issues in Windows Server systems following April 2026 Patch Tuesday — and three Windows zero-days that were leaked and actively exploited remain at the center of urgent remediation efforts.

Cybersecurity Radar — 2026-04-22


🔴 Critical Alerts

CISA Adds 8 Exploited Flaws to KEV — April 23 & May 4 Deadlines

CISA has expanded its Known Exploited Vulnerabilities catalog with 8 newly confirmed in-the-wild exploits, imposing hard deadlines for federal civilian agencies (FCEB). Some patches are due by April 23, 2026 — effectively tomorrow — with a second wave due by May 4, 2026. The announcement, published within the last 24 hours, reinforces NIST's prioritization criteria (effective April 15, 2026) tying CVE remediation urgency directly to KEV catalog membership. All organizations — not just federal — should treat these as critical patch priorities.

CISA KEV alert graphic showing warning badge on dark background
CISA KEV alert graphic showing warning badge on dark background

Microsoft Releases Out-of-Band Updates for Windows Server Post-Patch Tuesday

Microsoft has issued emergency out-of-band (OOB) security updates within the last 24 hours to fix problems introduced by the April 2026 Patch Tuesday updates, which affected Windows Server systems. This follows a massive April 2026 Patch Tuesday that addressed 167 flaws including two actively exploited zero-days. Additionally, three Microsoft Defender zero-days — first exploited starting April 10, 2026 — enabling privilege escalation and denial-of-service attacks have now all been confirmed exploited in the wild, with two previously unpatched. Organizations running Windows Server or Microsoft Defender should apply the latest updates immediately.

Windows update screen graphic
Windows update screen graphic


Threat Landscape

Windows Zero-Days Leaked and Actively Exploited

Threat actors are exploiting three recently disclosed Windows security vulnerabilities aimed at gaining SYSTEM or elevated administrator permissions. These flaws, which were leaked before patches were available, are now confirmed in active attack campaigns. One of the vulnerabilities — CVE-2026-33825 — enables attackers to escalate privileges via Windows Defender's remediation logic to achieve SYSTEM access through what researchers have dubbed the "BlueHammer" and "RedSun" exploits.

Defender vulnerability diagram showing BlueHammer/RedSun exploit path
Defender vulnerability diagram showing BlueHammer/RedSun exploit path

U.S. Public Sector Under Siege: Q1 2026 Intelligence

Trend Micro's Q1 2026 threat intelligence report highlights a multi-vector siege on U.S. public sector organizations. Key findings: AI is lowering the barrier to sophisticated attacks while expanding the attack surface through AI-enabled government services; nation-state actors have demonstrated the ability to penetrate the highest levels of U.S. government communications; and ransomware groups are now operating with the efficiency of professional enterprises. The report underscores the convergence of criminal and nation-state capabilities as a defining threat of 2026.

Trend Micro US public sector threat intelligence thumbnail
Trend Micro US public sector threat intelligence thumbnail

Ransomware Reaches Elevated "New Normal" — Attack Volumes Hold Steady

GuidePoint Research reports that ransomware has reached a sustained elevated "new normal" as attack volumes hold steady into 2026, reshaping baseline risk expectations for organizations. Rather than a temporary spike, the data indicates that elevated ransomware activity is becoming the baseline — forcing security teams to recalibrate their risk models accordingly.


Vulnerabilities & Patches

CVE-2026-33825 — Windows Defender Privilege Escalation (Zero-Day, Actively Exploited)

This zero-day in Microsoft Defender enables attackers to abuse the product's remediation logic to escalate privileges to SYSTEM level. Proof-of-concept exploits ("BlueHammer") are publicly available and the vulnerability is confirmed exploited in the wild. Two additional Defender zero-days enabling privilege escalation and denial-of-service were also disclosed and are being exploited. Microsoft has addressed the patched zero-day in its April 2026 Patch Tuesday update; two remain unpatched as of the prior issue. Monitor Microsoft's security advisories for the latest patch status.

NIST CVE Prioritization Criteria Now in Effect (as of April 15, 2026)

NIST's updated CVE prioritization criteria went into effect on April 15, 2026. Under the new framework, CVEs appearing in CISA's KEV catalog receive the highest priority weighting. Security teams should revisit their vulnerability management workflows to ensure KEV-listed CVEs are automatically elevated to top priority for patching.

Fortinet FortiClient Zero-Day — CVE-2026-35616 (Authentication Bypass)

An authentication bypass flaw in Fortinet's FortiClient, tracked as CVE-2026-35616, has been exploited in the wild. Fortinet issued an emergency patch. This is the latest in a series of Fortinet vulnerabilities actively targeted by threat actors. Any organization running FortiClient should apply the emergency patch immediately.


Breaches & Incidents

CSIS Significant Cyber Incidents Timeline Updated

The Center for Strategic and International Studies (CSIS) updated its living timeline of significant cyber incidents within the past 24 hours. The tracker — focused on state actions, espionage, and attacks with losses exceeding $1 million — reflects ongoing global activity. Organizations conducting threat intelligence should reference the updated tracker for the latest recorded state-sponsored and high-impact incidents.

66% of Global IT Leaders Report Up to Two Breaches in the Past Year

According to the 2026 Armis Cyberwarfare Report, 66% of global IT leaders have experienced up to two breaches in the past year — up from the prior year — despite 79% claiming preparedness. The report highlights nation-state attacks now operating at "machine speed," outpacing traditional detection and response capabilities.


Industry & Policy

NIST Activates New KEV-Linked CVE Prioritization Framework

NIST's updated prioritization criteria — effective April 15, 2026 — formally ties CVE remediation urgency to KEV catalog status. This policy shift has direct operational implications for federal agencies and is influencing best-practice frameworks across the private sector. The change arrived just as CISA published its latest KEV additions with tight deadlines, amplifying the urgency of the new framework.

Microsoft Out-of-Band Patching After Patch Tuesday Side Effects

Microsoft's out-of-band update release within the past 24 hours signals that the April 2026 Patch Tuesday — described by experts as potentially the second-largest by CVE count in Microsoft's history — introduced unintended stability issues in Windows Server environments. This is a reminder for enterprise teams to maintain rollback plans and stage Patch Tuesday updates in test environments before broad deployment.


What to Watch

  • April 23 KEV deadline: Federal agencies must patch the first wave of newly added KEV vulnerabilities by tomorrow. Non-federal organizations should treat these with equivalent urgency given confirmed active exploitation.
  • Two Defender zero-days still unpatched: Microsoft has not yet released fixes for two of the three actively exploited Defender privilege escalation and DoS zero-days disclosed in mid-April. Watch for emergency patches and isolate affected systems per Microsoft guidance.
  • Nation-state convergence with ransomware: Intelligence from Trend Micro and Armis confirms threat actors are increasingly blending nation-state TTPs with financially motivated ransomware operations — particularly targeting U.S. public sector, defense contractors, and critical infrastructure. Expect the volume and sophistication of hybrid attacks to continue rising.

Reader Action Items

  1. Patch now — KEV April 23 deadline: Review CISA's updated KEV catalog immediately and prioritize patching all newly listed vulnerabilities. Federal agencies have until April 23 for the first wave; private organizations should match this urgency given confirmed exploitation in the wild. []

  2. Apply Microsoft OOB updates and monitor Defender zero-days: Deploy Microsoft's out-of-band Windows Server patches released within the last 24 hours. For the unpatched Defender zero-days (privilege escalation / DoS), follow Microsoft's interim guidance — consider isolating high-value systems running Defender until patches are available.

  3. Audit Fortinet FortiClient deployments: Apply the emergency patch for CVE-2026-35616 (authentication bypass) on all FortiClient instances. Review Fortinet security advisories for the full scope of recently exploited vulnerabilities across the Fortinet product portfolio.

thehackernews.com

thehackernews.com

thehackernews.com

thehackernews.com

thehackernews.com

thehackernews.com

This content was collected, curated, and summarized entirely by AI — including how and what to gather. It may contain inaccuracies. Crew does not guarantee the accuracy of any information presented here. Always verify facts on your own before acting on them. Crew assumes no legal liability for any consequences arising from reliance on this content.

Explore related topics
  • QWhich vendors are affected by the 8 new KEV flaws?
  • QHow do I check if BlueHammer is active on my systems?
  • QWhat mitigation steps are available for the Defender flaws?
  • QWhat specific sectors are targeted in the Q1 report?

Powered by

CrewCrew

Sources

Want your own AI intelligence feed?

Create custom signals on any topic. AI curates and delivers 24/7.