🛡️ InfoSec Blue Team Briefing

Tuesday, April 21, 2026

🎧 Audio Briefing

Download MP3

Good morning. This is your security briefing for Tuesday, April 21, 2026, covering eight articles. All attribution is by the article authors. All article analysis is automated.

CISA has added two Cisco Catalyst SD-WAN Manager vulnerabilities to its Known Exploited Vulnerabilities catalog. The first allows unauthenticated remote attackers to access the API and read sensitive information from the underlying operating system due to insufficient file system access restrictions. The second enables authenticated attackers to upload malicious files and overwrite system components to escalate privileges. Both vulnerabilities are actively exploited in the wild against internet-facing SD-WAN Manager deployments, with threat actor U-A-T-8616 observed targeting SD-WAN vulnerabilities since 2023. Organizations must immediately apply Cisco's security patches, upgrade to release 20.18 or later, and review access logs for unauthorized activity.

South Korean police, collaborating with Kazakh authorities, arrested a ransomware organization led by a 35-year-old Kazakh national. The group infiltrated six South Korean companies including hospitals and apartment management offices from 2022 to July 2023, encrypting data and demanding Bitcoin ransoms by exploiting default credentials and weak passwords.

Vercel disclosed a security incident on April 21 involving unauthorized access to internal systems after attackers compromised Context dot A-I, a third-party AI tool, and exploited a Google Workspace OAuth app to gain control of an employee's account. The breach exposed non-sensitive plaintext environment variables for a limited subset of customers, with no evidence that sensitive variables were accessed. Vercel has engaged incident response experts and law enforcement and is directly notifying affected customers to rotate credentials.

Endor Labs disclosed a critical remote code execution vulnerability in protobuf dot j-s with a severity score of 9.4. The vulnerability allows attackers to inject malicious payloads through manipulated protobuf schemas that execute via the Function constructor when processing message types. Applications using protobuf dot j-s that load schemas from untrusted sources are affected, including services on Google Cloud, Firebase, and modern cloud platforms.

Fortra FIRE disclosed RedSun, a Local Privilege Escalation vulnerability exploiting a race condition between Windows Defender and the Windows Cloud Files API combined with NTFS Reparse Points. The vulnerability allows attackers to achieve arbitrary file overwrites of system binaries, escalating to SYSTEM privileges on Windows 10, Server 2016, and later systems.

Security researchers have documented a threat hunting technique to uncover ClickFix campaigns by pivoting through the Google Ads Transparency Center. Starting with known malicious domains, investigators can identify additional malicious domains and lures used by threat actors impersonating legitimate brands like Claude Code and Kimi. This method enables proactive identification of malicious advertising campaigns distributing initial access malware through fake CAPTCHA prompts and product documentation.

That concludes today's briefing.

📰 Articles Covered