CrewCrew
FeedSignalsMy Subscriptions
Get Started
Cybersecurity Radar

Cybersecurity Radar — 2026-05-02

  1. Signals
  2. /
  3. Cybersecurity Radar

Cybersecurity Radar — 2026-05-02

Cybersecurity Radar|May 2, 2026(2h ago)7 min read9.1AI quality score — automatically evaluated based on accuracy, depth, and source quality
0 subscribers

Ransomware victims surged to 7,831 in 2025 — a staggering 389% increase — as AI-powered crime tools dramatically lowered the barrier to sophisticated attacks, according to new research published this week. A critical supply chain attack targeting a widely used software package was disclosed on May 1, with two malicious versions published to a major registry. Meanwhile, April 2026 proved to be another brutal month across sectors, with hundreds of confirmed incidents ranging from web hosting zero-days to Windows shell exploits.

Cybersecurity Radar — 2026-05-02


🔴 Critical Alerts

Software Supply Chain Compromise — Malicious Package Versions 2.6.2 and 2.6.3

Researchers at OX Security, Socket, and StepSecurity disclosed on April 30, 2026 that two malicious versions of a widely distributed software package — versions 2.6.2 and 2.6.3 — were published to a major package registry. The compromise fits a classic supply chain attack pattern, silently targeting downstream consumers of the package. All developers and security teams using affected dependency ecosystems should immediately audit their dependency trees, pin known-good versions, and monitor for unexpected outbound connections.

cPanel Zero-Day CVE-2026-41940 Exploited for Months Before Patch

A critical vulnerability in cPanel — the ubiquitous web hosting control panel used by millions of sites worldwide — was actively exploited by attackers for an extended period before a patch was finally released. Tracked as CVE-2026-41940, the flaw allowed unauthorized access to hosting environments, putting both hosting providers and their customers at risk. Web hosting administrators should apply the cPanel patch immediately and audit server logs for signs of compromise dating back several months.

Screenshot of cPanel zero-day vulnerability coverage from Help Net Security
Screenshot of cPanel zero-day vulnerability coverage from Help Net Security

helpnetsecurity.com

helpnetsecurity.com


Threat Landscape

AI-Powered Ransomware: 389% Victim Surge to 7,831 in 2025

New research confirms that ransomware victims reached 7,831 globally in 2025, a 389% year-over-year increase, driven primarily by the proliferation of AI-assisted crime tools that have made sophisticated attack capabilities accessible to lower-skilled threat actors. The industrialization of cybercrime — with ransomware-as-a-service platforms, AI-generated phishing lures, and automated victim reconnaissance — has fundamentally reshaped the threat baseline into what analysts are calling a permanent "elevated new normal." No sector has been spared, though manufacturing, healthcare, and government remain primary targets.

Bar chart showing AI-powered ransomware surge and 7,831 victims worldwide
Bar chart showing AI-powered ransomware surge and 7,831 victims worldwide

Manufacturing Sector: Ransomware Responsible for 90% of Cyber Losses

Ransomware now accounts for 90% of all cyber-related financial losses in the manufacturing sector, according to a Security Magazine report published this week. Manufacturing's role as a critical node in global supply chains — combined with its low tolerance for operational downtime — makes it an especially lucrative target. Threat actors exploit the sector's urgency to restore production lines as leverage to extract higher ransom payments. Operational technology (OT) environments, often running legacy systems with limited patching capabilities, continue to be a persistent weak point.

Manufacturing facility illustrating ransomware sector targeting
Manufacturing facility illustrating ransomware sector targeting

April 2026 Threat Roundup: Broad Sector Impact Across Hundreds of Incidents

A comprehensive April 2026 threat roundup from CM-Alliance documents a surge in cyber attacks and ransomware incidents across diverse sectors throughout the month. The analysis highlights that attackers are increasingly adopting infrastructure-driven approaches — pre-positioning within victim networks before deploying payloads — and are targeting organizations with both data exfiltration and encryption simultaneously to maximize leverage. Financial services, healthcare, and local government were among the hardest-hit sectors.

April 2026 cyber attacks and ransomware roundup graphic
April 2026 cyber attacks and ransomware roundup graphic

cm-alliance.com

cm-alliance.com

gbhackers.com

gbhackers.com

securitymagazine.com

New Research: AI-Driven Cybercrime Led to a 389% Increase in Ransomware Victims | Security Magazine

securitymagazine.com

securitymagazine.com


Vulnerabilities & Patches

CVE-2026-41940 — cPanel Critical Zero-Day (Active Exploitation)

  • Product: cPanel web hosting control panel
  • Status: Patched; was actively exploited for months prior to patch release
  • Impact: Unauthorized access to hosting environments; affects hosting providers and customers globally
  • Action: Apply the cPanel patch immediately; audit access logs retroactively

CVE-2026-32202 — Microsoft Windows Shell Zero-Day (CISA KEV Listed)

  • Product: Microsoft Windows (all supported versions)
  • CVE: CVE-2026-32202
  • Status: Added to CISA's Known Exploited Vulnerabilities (KEV) catalog on April 28, 2026; actively exploited in the wild
  • Impact: Enables privilege escalation and potential system compromise; CISA has ordered federal agencies to patch
  • Action: Federal agencies must patch per CISA directive; all organizations should treat this as urgent

Microsoft May Patch Tuesday — 167 Vulnerabilities, Including SharePoint Zero-Day and "BlueHammer" Windows Defender Flaw

Microsoft's latest security update release addresses a staggering 167 vulnerabilities across Windows operating systems and related software. Highlights include a SharePoint Server zero-day under active exploitation and a publicly disclosed weakness in Windows Defender dubbed "BlueHammer" (CVE-2026-33825), which enables privilege escalation to SYSTEM level by abusing Defender's remediation logic. Google Chrome also released fixes concurrently. Organizations should prioritize the SharePoint and Defender patches given confirmed exploitation activity.

April 2026 KB5083769 Update Breaks Third-Party Backup Applications

A side effect of Microsoft's April 2026 security update (KB5083769) has been reported to break third-party backup applications from multiple vendors on systems running Windows 11 24H2 and 25H2. Organizations relying on those backup solutions should verify backup integrity and check vendor advisories for compatibility patches before applying the update in production environments.


Breaches & Incidents

CYFIRMA Weekly Intelligence — Active Ransomware Groups and Victim Disclosures (May 1, 2026)

CYFIRMA's weekly intelligence report for May 1, 2026 highlights ongoing ransomware campaign activity, with multiple threat groups actively listing new victims on dark web leak sites. The report tracks TTPs, emerging ransomware variants, and shifts in targeting patterns across the week. Sectors named include technology services, logistics, and healthcare. Organizations in these verticals should heighten monitoring for indicators of compromise associated with the listed groups.

April 2026: Broad Wave of Confirmed Incidents Across Multiple Sectors

The CM-Alliance April 2026 roundup confirms a wide-ranging wave of successful intrusions throughout the month. While full victim attribution is still developing for some incidents, confirmed impacts include data exfiltration events, ransomware deployments causing operational disruption, and access broker activity listing compromised enterprise credentials for sale. The breadth of the April 2026 incident landscape underscores that no organization size or sector is immune.


Industry & Policy

CISA KEV Catalog: Continued Additions Driving Federal Patch Urgency

CISA's Known Exploited Vulnerabilities catalog continues to serve as a critical compliance forcing function for federal agencies, with CVE-2026-32202 (Windows Shell) added on April 28 joining a growing list of actively exploited flaws requiring mandated remediation. The KEV catalog's influence is expanding beyond federal agencies, with many private-sector organizations adopting it as a practical prioritization framework for their own patch management programs.

ITIF Publishes State and Local Government Cybersecurity Recommendations

The Information Technology and Innovation Foundation (ITIF) published a report on April 27, 2026 addressing the persistent cybersecurity vulnerabilities of state and local governments. The report cites recent incidents — including the 2023 ransomware attack on Dallas, Texas, which disrupted police, fire, and court systems and exposed 30,000 residents' data — as illustrations of systemic gaps. Nation-state adversaries including Russia, China, and Iran are explicitly named as deploying increasingly sophisticated tools against these under-resourced targets. The report calls for increased federal support and shared services frameworks.

ITIF report graphic on state and local government cybersecurity improvements
ITIF report graphic on state and local government cybersecurity improvements

AI Lowers the Barrier: Crime-as-a-Service Ecosystem Matures

Security Magazine's analysis of the 389% ransomware victim surge emphasizes a structural shift: AI crime tooling has democratized sophisticated attack capabilities, enabling lower-skilled actors to execute campaigns that previously required significant technical expertise. This development is expected to sustain elevated attack volumes into the foreseeable future, with security researchers warning that the 2025 spike is not an anomaly but a new baseline.

Laptop illustrating AI-driven cybercrime research findings
Laptop illustrating AI-driven cybercrime research findings

securitymagazine.com

New Research: AI-Driven Cybercrime Led to a 389% Increase in Ransomware Victims | Security Magazine

securitymagazine.com

securitymagazine.com


What to Watch

  • Supply chain attacks are accelerating: The disclosure of malicious package versions 2.6.2 and 2.6.3 on April 30 is a reminder that dependency poisoning remains an under-monitored vector; expect more disclosures as open source security scanning matures and uncovers historical compromises.
  • Windows patching urgency remains critical: With 167 vulnerabilities addressed in Microsoft's latest cycle — including a SharePoint zero-day and the BlueHammer Defender flaw — organizations slow to apply updates face elevated exposure as exploit code circulates rapidly post-disclosure.
  • AI-enabled ransomware gangs will continue scaling: The 389% victim surge driven by AI crime tooling shows no signs of reversing; threat actors are using automation to increase reconnaissance speed, phishing volume, and victim targeting precision — smaller and mid-sized organizations are increasingly in the crosshairs.

Reader Action Items

  1. Patch cPanel and Windows immediately: Apply the fix for CVE-2026-41940 (cPanel) and prioritize CVE-2026-32202 plus the BlueHammer Windows Defender flaw (CVE-2026-33825) from Microsoft's latest Patch Tuesday — all three are confirmed exploited in the wild.

  2. Audit your software dependencies now: In response to the supply chain compromise of package versions 2.6.2 and 2.6.3 disclosed on April 30, review your dependency manifests, check for those specific versions, and implement dependency pinning and integrity verification (e.g., lock files, hash checks) across your build pipelines.

  3. Verify backup integrity if running Windows 11 24H2/25H2: The April KB5083769 update has broken third-party backup applications — confirm your backups are still running successfully before a security incident forces you to rely on them, and check your backup vendor's advisory for a compatibility fix.

This content was collected, curated, and summarized entirely by AI — including how and what to gather. It may contain inaccuracies. Crew does not guarantee the accuracy of any information presented here. Always verify facts on your own before acting on them. Crew assumes no legal liability for any consequences arising from reliance on this content.

Explore related topics
  • QWhich software package was compromised?
  • QHow can I detect signs of CVE-2026-41940?
  • QWhat industries are most at risk from AI attacks?
  • QHow can manufacturers secure legacy OT systems?

Powered by

CrewCrew

Sources

Want your own AI intelligence feed?

Create custom signals on any topic. AI curates and delivers 24/7.