
Loading summary
A
April is Trust Month at the CISO series. Join us later today for our Super Cyber Friday livestream about hacking vendor trust. More details at the end of this
B
episode from the CISO series. It's Cybersecurity Headlines
A
These are the cybersecurity headlines for Friday, April 10, 2026. Steve I'm Steve Prentiss. Google API keys in Android apps expose Gemini endpoints Researchers from Truffle Security are warning that API keys for public services such as Google Maps can be used to authenticate to the Gemini AI assistant, potentially exposing personal data. This announcement was based on the researchers scanning millions of websites and finding nearly 3,000 Google API keys that now also authenticate to Gemini even though they were never intended for it. It this could allow an attacker to access uploaded files, cached data and to charge LLM usage to your account, they said. Additional research from mobile security firm Quokka led to the discovery of over 35,000 unique keys across 250,000 Android applications. Also, Cloudsec says it discovered 32 Google API keys hard coded in 22 popular Android apps that provide unauthorized access to Gemini AI. Acrobat Reader Zero day flaw exploited since December, according to Bleeping Computer. The attacks were discovered by security researcher Haipei Li, the founder of the sandbox based exploit detection platform Expmon, who warned on Tuesday that the attackers are using what he described as a highly sophisticated fingerprinting style PDF exploit to target an undisclosed Adobe Reader security flaw. Lee added that Adobe users have been targeted for at least four months, with data being stolen from compromised Systems using privileged APIs and deploying additional exploits. A link to Li's long list of security vulnerabilities in Microsoft, Google and Adobe software, many of which have been exploited in zero day attacks, is available in the show. Notes to this episode, Microsoft developer chief Julia Lewison departs. Lewsin will resign as president of Microsoft's developer division at the end of June, though she will continue in an advisory role. She has been part of Microsoft's Core AI division, introduced by CEO Satya Nadella in January 2025. She also assumed responsibility for GitHub in August 2025, at which time GitHub became part of Core AI. Liu Sin, who started at Microsoft after graduating in 1992, is credited with leading the effort to make the open source and cross platform Cryptocurrency ATM company Bitcoin Depot reports cyberattack this March 23 attack resulted in a threat actor gaining control of credentials associated with the company's digital asset settlement accounts, leading to the theft of almost 51 bitcoin from company controlled wallets. This had a value of about $3.665 million as of the date of the report. Bitcoin Depot believes that the incident was contained to the company's corporate environment and did not affect the company's customer platforms, divisions, system, data or environments. Bitcoin Depot is the largest cryptocurrency ATM company in the U.S. huge thanks to our sponsor Vanta. Risk and regulation ramping up and customers expect proof of security just to do business. Vanta's automation brings compliance, risk and customer Trust together on one AI powered platform. So whether you're prepping for a SoC2 or running an enterprise GRC program, Vanta keeps you secure and keeps your deals moving. Learn more@vanta.com CISO that is V A N T A.com CISO breach exposes sensitive LAPD files stored in city attorney system the Los Angeles Police Department made an announcement on Tuesday stating that hackers had gained access to a Los Angeles City Attorney's office digital storage system containing sensitive police documents. These documents had been turned over in discovery from previously resolved or settled LAPD civil litigation cases. The hackers did not breach any LAPD systems or networks, according to the press release. The statement said the hackers accessed a third party tool used by the City Attorney's office to transfer discovery to opposing counsel and litigants. Minnesota governor calls in National Guard after cyber attack this follows a ransomware attack on Winona county on Monday which disrupted vital, emergency and critical services. Minnesota governor Tim Waltz issued an executive order on Tuesday saying, unfortunately, the scale and complexity of this incident has exceeded both internal and commercial response capabilities. A specialized cybersecurity and recovery team from the Minnesota National Guard is now in the county supporting the investigation and restoration efforts. There has been no confirmation as to whether this attack is related to the one that the county suffered in January. Intent redirection vulnerability in third party SDK exposes Android wallets Microsoft is warning of a severe intent redirection vulnerability in a widely used third party Android SDK called Engage SDK. Discovered during routine research, this flaw allows apps on the same device to bypass Android Security sandbox and gain unauthorized access to private Data. With over 30 million installations of third party crypto wallet applications alone, PII user credentials and financial data were exposed to risk, the company said. The security blog adds that because Android apps frequently depend on external libraries, insecure integrations can introduce attack surfaces into otherwise secure applications. New Chaos variant targets misconfigured cloud deployments Researchers at darktrace have identified a new malware variant called Chaos, which can hit misconfigured cloud deployments and consequently expand beyond its traditional focus on routers and edge devices. Chaos is a cross platform malware capable of targeting Windows and Linux environments. It is assessed to be an evolution of another DDoS malware known as KG Kai, that has singled out misconfigured Docker instances. Darktrace added the recent shift in botnets such as Isuru and Chaos to include proxy services as core features demonstrates that denial of service is no longer the only risk that these botnets pose to organizations and their security teams. Be sure to register to join us later today for Hacking Vendor Trust, part of our ongoing Trust Month of episodes. On Super Cyber Friday, we'll be breaking down how to build trust with a vendor when a vendor becomes a trusted partner, and how to navigate people change at a trusted vendor. It's a full hour of discussion, so join our chat room to get involved and play a few fun games. Head on over to the events page@cisoseries.com to register. And if you have some thoughts on the news from today or about this show in general, please be sure to reach out to us at feedback@cisoseries.com we would love to hear from you. I'm Steve Prentiss reporting for the CISO series.
B
Cybersecurity headlines are available every weekday. Head to CISoseries.com for the full stories behind the headlines.
Date: April 10, 2026
Host: Steve Prentiss, CISO Series
Episode Theme:
This episode presents urgent and impactful cybersecurity stories, covering API security lapses in Android apps, an active zero-day in Adobe Reader, a significant cryptocurrency theft, governmental responses to ransomware, and emerging malware threats to cloud infrastructure.
On the scale of Android API exposure:
"Researchers…finding nearly 3,000 Google API keys that now also authenticate to Gemini even though they were never intended for it." – Steve Prentiss [00:30]
On National Guard intervention:
"A specialized cybersecurity and recovery team from the Minnesota National Guard is now in the county supporting the investigation and restoration efforts." [05:14]
| Topic | Timestamp | |---------------------------------------------------|------------| | Android API keys & Gemini exposure | 00:19–01:28| | Acrobat Reader zero-day flaw | 01:30–02:19| | Bitcoin Depot cyberattack | 02:24–03:19| | LAPD files exposed in City Attorney breach | 04:10–04:54| | Minnesota National Guard & ransomware response | 04:57–05:37| | Android Engage SDK intent redirection vulnerability| 05:39–06:19| | Chaos malware hitting cloud deployments | 06:22–07:12|
For more detailed information on each headline, visit cisoseries.com.