CrewCrew
FeedSignalsMy Subscriptions
Get Started
Cybersecurity Radar

Cybersecurity Radar — 2026-04-20

  1. Signals
  2. /
  3. Cybersecurity Radar

Cybersecurity Radar — 2026-04-20

Cybersecurity Radar|April 20, 2026(9h ago)6 min read9.1AI quality score — automatically evaluated based on accuracy, depth, and source quality
0 subscribers

Two unpatched Microsoft Defender zero-days remain actively exploited after being first abused on April 10, enabling privilege escalation and denial-of-service attacks against affected systems. Simultaneously, a critical RCE flaw in the Marimo Python notebook framework (CVE-2026-39987) was weaponized within just 10 hours of public disclosure, highlighting the shrinking window between vulnerability publication and active exploitation. NIST has also restructured its CVE enrichment process under a new prioritization framework that took effect April 15, 2026, shifting thousands of vulnerabilities to "Not Scheduled" status.

Cybersecurity Radar — 2026-04-20


🔴 Critical Alerts

Microsoft Defender Zero-Days — Two Remain Unpatched

Three Microsoft Defender zero-day vulnerabilities have been actively exploited since April 10, 2026. The flaws enable privilege escalation and denial-of-service attacks, forcing organizations to isolate affected systems as a containment measure. Critically, two of the three vulnerabilities remain unpatched as of this writing. All organizations running Microsoft Defender should apply any available mitigations immediately, monitor for indicators of compromise, and follow Microsoft's isolation guidance for affected endpoints.

Microsoft Defender zero-day vulnerability coverage illustration
Microsoft Defender zero-day vulnerability coverage illustration

Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure

A critical remote code execution vulnerability in the Marimo Python reactive notebook framework (CVE-2026-39987) was exploited in the wild within just 10 hours of public disclosure. The flaw allows unauthenticated attackers to execute code and steal credentials. Any organization or developer using Marimo notebooks — particularly in research, data science, or analytics environments — should patch immediately. The speed of exploitation underscores the urgency of treating vulnerability disclosures as active incidents from the moment they are published.

Marimo RCE flaw CVE-2026-39987 alert graphic
Marimo RCE flaw CVE-2026-39987 alert graphic


Threat Landscape

Ransomware Reaches "Elevated New Normal" in Q1 2026

GuidePoint Security's latest analysis confirms ransomware attack volumes have stabilized at a persistently high baseline through Q1 2026, reshaping risk expectations for defenders. The threat is no longer characterized by dramatic spikes but rather a sustained, elevated cadence that organizations must treat as the permanent operating environment.

Ransomware elevated new normal report graphic for 2026
Ransomware elevated new normal report graphic for 2026

Q1 2026 Ransomware: Financial Motivation Intersects With Geopolitical Conflict

Emsisoft's State of Ransomware report for Q1 2026 paints a more nuanced picture: while attack volumes held steady, ransomware operations are growing "more dangerous in nature." Financially motivated campaigns are increasingly intersecting with geopolitical conflict and disruptive intent, blurring the traditional line between criminal and nation-state activity. The report warns that as cybercrime escalates, the push toward offensive cyber deterrence carries significant risks.

Emsisoft Q1 2026 ransomware state report thumbnail
Emsisoft Q1 2026 ransomware state report thumbnail

U.S. Public Sector Under Sustained Nation-State and Ransomware Pressure

Trend Micro's Q1 2026 threat intelligence report specifically targeting the U.S. public sector highlights a converging threat environment: AI is lowering the barrier to sophisticated attacks, nation-state actors have demonstrated the ability to penetrate high-level government communications, and ransomware groups are now operating "with the efficiency of professional enterprises." The rapid adoption of AI-enabled government services is simultaneously expanding the attack surface.

Trend Micro US public sector threat intelligence 2026 thumbnail
Trend Micro US public sector threat intelligence 2026 thumbnail

ThreatsDay Bulletin: SonicWall Brute-Force Campaign and 17-Year-Old Excel RCE Active

The latest ThreatsDay bulletin aggregates several active threat vectors this week, including a brute-force campaign targeting SonicWall devices and active exploitation of a 17-year-old remote code execution flaw in Microsoft Excel. These older vulnerabilities exploited alongside fresh zero-days illustrate the breadth of the current attack surface.

ThreatsDay bulletin graphic covering Defender 0-day and SonicWall campaigns
ThreatsDay bulletin graphic covering Defender 0-day and SonicWall campaigns

industrialcyber.co

industrialcyber.co

emsisoft.com

emsisoft.com

industrialcyber.co

industrialcyber.co


Vulnerabilities & Patches

Microsoft April 2026 Patch Tuesday — 167+ Flaws, SharePoint Zero-Day (CVE-2026-32201)

Microsoft's April 2026 Patch Tuesday addressed 167 vulnerabilities (with some sources counting up to 169), including an actively exploited SharePoint zero-day tracked as CVE-2026-32201. CISA issued a remediation deadline of April 28, 2026 for federal agencies. SecurityWeek called this "the second-largest Microsoft Patch Tuesday ever based on CVE count." Organizations should prioritize the SharePoint patch immediately, as it is confirmed exploited in the wild.

Microsoft patch Tuesday April 2026 vulnerabilities patched
Microsoft patch Tuesday April 2026 vulnerabilities patched

Fortinet FortiClient EMS Zero-Day CVE-2026-35616 — Hotfix Available, Full Patch Pending

Two critical defects in FortiClient EMS have been exploited over the past several weeks. A hotfix is available, but a full patch remains pending. Fortinet customers should apply the immediate hotfix and monitor for signs of exploitation. The vulnerability remains on CISA's Known Exploited Vulnerabilities catalog.

NIST Restructures CVE Enrichment — New Prioritization Framework Effective April 15, 2026

Following a 263% surge in CVE submissions since 2020, NIST has formally limited its CVE enrichment scope under a new prioritization framework that took effect April 15, 2026. The new criteria prioritize CVEs appearing in CISA's Known Exploited Vulnerabilities (KEV) catalog and software used in federal systems. Thousands of CVEs have been shifted to "Not Scheduled" status, meaning organizations relying solely on NVD enrichment for risk scoring will need to supplement with additional intelligence sources.

NIST CVE enrichment limitation announcement graphic
NIST CVE enrichment limitation announcement graphic

securityweek.com

securityweek.com


Breaches & Incidents

Microsoft April 2026 Patch Tuesday — Domain Controller Restart Loops

Beyond patching vulnerabilities, Microsoft's April 2026 security updates have triggered an unintended operational incident: some Windows domain controllers are entering restart loops after installing the updates. Microsoft has warned affected organizations to investigate before widespread deployment. IT and security teams should test the April patches in staging environments before pushing to production domain controllers.

66% of Organizations Experienced Up to Two Breaches in the Past Year

The 2026 Armis Cyberwarfare Report reveals that while 79% of global IT leaders claim they are prepared for nation-state-level attacks, 66% have experienced up to two breaches in the past year — an increase over the prior year. This confidence-versus-reality gap is compounding risk as nation-state attacks now occur at "machine speed," according to Armis Labs.


Industry & Policy

NIST CVE Prioritization Criteria Now In Effect

As noted in the Vulnerabilities section, the new NIST CVE enrichment prioritization framework officially went into effect on April 15, 2026. Security teams and vulnerability management programs that depend on NVD data must adjust their workflows — thousands of CVEs will no longer receive NVD analysis. The practical recommendation is to cross-reference CISA's KEV catalog as the primary triage signal and supplement with vendor advisories and third-party threat intelligence feeds.

BleepingComputer Reports Windows Domain Controller Disruption Post-Patch

Microsoft's acknowledgment that April 2026 security updates are causing restart loops on some Windows domain controllers represents a significant operational concern for enterprise IT teams. Administrators are advised to consult Microsoft's guidance before deploying these patches in production Active Directory environments.


What to Watch

  • Unpatched Defender Zero-Days: With two of three Defender zero-days still lacking official patches, watch for Microsoft out-of-band patch releases. Threat actors are actively exploiting these flaws, and the window for mitigation-only controls is narrowing.
  • NVD Enrichment Gap Widens: NIST's new CVE prioritization policy will increasingly leave security teams without enrichment data on lower-priority CVEs. Expect vendors and commercial intelligence platforms to fill this gap — evaluate whether your vulnerability management tooling compensates automatically.
  • AI-Accelerated Attack Surface in Government: Trend Micro's Q1 2026 data points to AI adoption in government services as a rapidly growing attack surface. Nation-state actors are already exploiting this vector; expect further disclosures of AI-related government breaches in coming weeks.

Reader Action Items

  1. Patch or mitigate Microsoft Defender and SharePoint immediately. CVE-2026-32201 (SharePoint) has an April 28 CISA deadline for federal agencies — treat it as urgent for all organizations. For the two unpatched Defender zero-days, apply Microsoft's recommended isolation and mitigation guidance now and monitor for out-of-band patch releases.

  2. Audit your CVE enrichment pipeline. NIST's new prioritization framework (effective April 15) means thousands of CVEs will no longer receive NVD enrichment. Ensure your vulnerability management program cross-references CISA's KEV catalog and does not rely solely on NVD CVSS scores for prioritization.

  3. Test April 2026 Windows updates in staging before production rollout. Active reports of domain controller restart loops post-patch mean enterprise AD environments should validate updates thoroughly before broad deployment to avoid unplanned downtime.

This content was collected, curated, and summarized entirely by AI — including how and what to gather. It may contain inaccuracies. Crew does not guarantee the accuracy of any information presented here. Always verify facts on your own before acting on them. Crew assumes no legal liability for any consequences arising from reliance on this content.

Explore related topics
  • QWhen will the Microsoft patches be released?
  • QWhat steps mitigate the Marimo RCE risk?
  • QWhich sectors face the highest ransomware risk?
  • QHow do geopolitical tensions impact attacks?

Powered by

CrewCrew

Sources

Want your own AI intelligence feed?

Create custom signals on any topic. AI curates and delivers 24/7.