Good morning. Here's everything that happened in cybersecurity yesterday — in under 5 minutes.
Trust is the attack surface — yesterday and this morning, attackers weaponized GitHub notifications, a fitness app, a travel platform, a cloud analytics vendor, and your own endpoint security tools. The front door is no longer where breaches begin.
🔥 Top Stories
01 — Ransomware Groups Are Now Routinely Deploying "EDR Killers" to Blind Your Defenses — ESET Warns
Ransomware
ESET Research has published a comprehensive warning that RansomHub and other major ransomware groups have professionalized their use of "EDR killer" tools — specialized malware designed to disable Endpoint Detection and Response agents before deploying ransomware. If your EDR is your last line of defense, it may no longer be standing when you need it most.
02 — Anodot Breach Is "Patient Zero" for Cascading Snowflake Extortion Attacks
Supply Chain
A breach at Anodot, a cloud cost monitoring platform with deep Snowflake permissions, has been confirmed as the origin point for a series of high-profile data thefts — including the Rockstar Games incident. One vendor with elevated cloud access becomes the master key to multiple enterprises simultaneously. Every SaaS integration in your Snowflake environment is now a potential breach vector.
03 — Attackers Are Abusing GitHub and Jira Notifications to Bypass Your Email Security
Phishing
Threat actors have found a reliable way around email security filters: route phishing lures through GitHub and Jira's own notification systems. Because the emails come from legitimate platforms, they pass SPF, DKIM, and DMARC checks cleanly. Developers — who receive GitHub notifications constantly and are trained to trust them — are the primary target.
04 — Booking.com Confirms Global Breach — Reservation Data Exposed, Phishing Wave Already Underway
Data Breach
The world's largest travel platform has confirmed unauthorized access to customer booking data, and a targeted phishing wave is already in motion. Attackers now have names, travel dates, destinations, and contact details — everything needed for highly convincing follow-on fraud. If your employees book corporate travel through Booking.com, flag any related emails as high-risk immediately.
05 — The New Hostage Negotiator: Cybersecurity's Fastest-Growing Role Has Nothing to Do With Firewalls
Cyber Analysis
As ransomware matures into a structured extortion economy, a new specialist class is emerging — one whose most powerful tool is conversation, not code. Ransomware negotiators are now a standard part of enterprise incident response, and understanding how the negotiation economy works is becoming essential knowledge for security leaders.
06 — Digital Slavery: Infoblox Links Android Banking Trojan Surge to Cambodian Forced-Labor Compounds
Threat Intelligence
A landmark Infoblox investigation has drawn a direct technical line between a wave of sophisticated Android banking trojans targeting 21 countries and industrial-scale scam operations in Southeast Asia staffed by human trafficking victims. This is the clearest picture yet of how organized crime, malware-as-a-service, and forced labor have merged into a single global criminal industry.
📊 By The Numbers
1M+ — Basic-Fit members with bank and IBAN data exposed
21 — Countries targeted by the Cambodia-linked Android banking trojan
0 — Email filters that stop phishing sent from GitHub's own servers
⚡ The Signal
Trust is the attack surface — and this morning's stories make that clearer than ever. EDR killers don't find a gap in your defenses, they disable the defenses themselves. GitHub notifications don't look like phishing, so they aren't treated like phishing. A Snowflake vendor with cloud-wide permissions doesn't look like a risk until it becomes one. Ransomware negotiators exist because attackers have professionalized their operations faster than defenders have adapted. The consistent thread across all of today's stories: the attack is arriving as something you've already decided to trust. That's the hardest problem in security — and right now, it's the one being exploited most aggressively.
🔍 What You May Have Missed
ShinyHunters made good on the Rockstar deadline — data is now public
After Rockstar called the breach "non-material," ShinyHunters followed through and began releasing stolen data after the April 14 deadline passed.
OpenAI rotates macOS signing certificates after Axios supply chain hit
OpenAI confirmed it rotated its developer signing certificates for macOS after the malicious Axios npm package executed in a GitHub Actions workflow. All macOS desktop users are being forced to update.
Trump's FY2027 budget proposes 30% CISA funding cut
The White House has proposed a $707 million reduction to CISA — roughly 30% of its current budget.
📅 What to Watch
Rockstar/ShinyHunters — what data was actually released and what it means for enterprise third-party risk programs
EDR killer proliferation — watch for ESET's full technical report and vendor responses from CrowdStrike, SentinelOne, and Microsoft Defender
Booking.com phishing wave — corporate travel accounts are the primary target; expect fraud reports to surface this week
CISA budget proposal — congressional and industry pushback expected; watch for CISA's own response
Stay sharp. Stay ahead.
Till next time,

