
Loading summary
Announcer
Before we get into the headlines, just a quick reminder that April is Trust
Steve Prentiss
Month at CISO Series, and we've got
Announcer
some fun events lined up in April to talk about trust in cybersecurity. So stay tuned to the end of
Steve Prentiss
this episode for more details from the
Narrator
CISO series, it's Cybersecurity Headlines.
Steve Prentiss
These are the cybersecurity headlines for Friday, April 3, 2026. I'm Steve Prentiss 250,000 people affected by data breach at Texas Hospital this incident
Announcer
occurred at Naca Doches Memorial Hospital in the city of NACA Doches, Texas on January 31st. Hospital representatives state that a threat actor hacked into its internal network and information systems and quote, likely accessed the information of 257,000 individuals, end quote with potentially compromised data including standard PII as well as medical record numbers, account numbers, health plan beneficiary numbers and photographs. The hospital has not named any potential
Steve Prentiss
suspects nor have any claims yet been made.
Announcer
CISA says patch Citrix netscaler bug by
Steve Prentiss
Thursday following up on a story we
Announcer
covered this week, CISA has now ordered
Steve Prentiss
federal agencies to patch the CVE numbered
Announcer
bug by Thursday since reports of exploitation
Steve Prentiss
emerged over the weekend.
Announcer
This vulnerability impacts Citrix NetSCALAR application delivery controllers used to manage traffic and authentication. It carries a severity score of 9.3 and has the hallmarks of Citrix bleed
Steve Prentiss
and Citrix bleed Two researchers uncover mining operation using Isolures Researchers from Elastic Security
Announcer
are warning of a financially motivated operation codenamed ref1695, which has been leveraging fake installers to deploy remote access Trojans at and cryptocurrency miners since November of 2023. In addition to crypto mining, the threat actor monetizes infections through cost per action fraud, directing victims to content locker pages under the guise of software registration. These attacks leverage an ISO file as
Steve Prentiss
the infection vector to bypass Microsoft Defender smart screen protections.
Announcer
A link to more details about this multi level attack technique is available in
Steve Prentiss
the show notes to this episode. New Storm infostealer remotely decrypts stolen credentials
Announcer
this particular warning comes from security researchers at Varonis who say this new stealer malware harvests browser credentials, session cookies and crypto wallets. Daniel Kelly, a senior security consultant at Varonis, says this new infosteeler represents a shift in how credential theft is developing. Whereas traditional info stealers used to decrypt browser credentials on the victim's machine, endpoint security tools adapted to flag such malicious behavior, Storm instead sends encrypted files to its own infrastructure instead of decrypting them locally. It is also available for enterprising cybercriminals for less than $1,000 per month, huge thanks to our sponsor ThreatLocker. Security controls fail when they break the business. Successful teams phase in protections gradually, starting with visibility, then moving to enforcement. That approach allows organizations to reduce risk without overwhelming IT teams or disrupting critical workflows. Learn more at threatlocker.com UK Security Centre warns of hackers increasing WhatsApp and Signal attacks this warning comes from the National Cybersecurity center based in the uk, which has seen growing malicious activity from Russia
Steve Prentiss
based actors using messaging apps to target high risk individuals. This includes people working in government and
Announcer
politics, academia, journalism and the legal profession. This has been an ongoing story for quite a while, but this March 31 report from the NCSC raises the stakes a little by both confirming the increase in activity and and also adding China state affiliated group APT31 and hackers linked to Iran's Islamic Revolutionary Guard Corps to
Steve Prentiss
the activities
Announcer
criminals taught to exploit vacant
Steve Prentiss
homes in hybrid cybercrime technique Online fraud
Announcer
tutorials are now teaching hackers how to exploit publicly available data, weak identity verification processes and operational gaps to identify and exploit vacant residential properties to intercept sensitive mail for the purposes of enabling identity
Steve Prentiss
theft and financial fraud.
Announcer
These real residential temporarily unoccupied properties can be used to receive mail without immediately
Steve Prentiss
alerting the rightful occupants.
Announcer
In the tutorial. Threat actors Learn how to search real
Steve Prentiss
estate platforms such as Zillow, rightmove or
Announcer
zoopla filtering for recently listed rental properties as well as older listings to identify properties that have remained unoccupied for extended
Steve Prentiss
periods, increasing their reliability as drop locations.
Announcer
In some cases, threat actors even recommend physically maintaining abandoned properties to make them appear occupied, reducing the risk of drawing
Steve Prentiss
attention while using the address for fraudulent purposes.
Announcer
Nissan says Stolen data came from third party vendor Japanese automaker Nissan has stated that recent claims of a data breach were related to information held by a third party vendor. This follows an announcement from the Everest Hacking Group, which said it had breached the file transfer system used by a company that offers services to Nissan and Infiniti dealerships across North America. The group claims to be in possession of 910gb of stolen data, including information on customers, dealerships and loans offered to car buyers. Nissan reiterated that it had found no indication that Nissan systems were compromised or that any Nissan customer information was accessed
Steve Prentiss
or or put at risk.
Announcer
Threat actors impersonate cert Ua to spread malware the Computer Emergency Response Team of Ukraine Certua has itself revealed details of a phishing campaign that once again has impersonated the agency, this time to distribute
Steve Prentiss
a rat called ageweeze.
Announcer
The campaign was carried out by a group known as UAC0255, which urged recipients to install specialized software. These recipients include state organizations, medical centers, security companies, educational institutions, financial institutions, and software development companies. If you're listening to this on Friday morning, then there is still time to join us for our first Super Cyber Friday of Trust Month at 1pm today. The topic will be Hacking Trust in Leadership. We'll be spending an hour discussing how cybersecurity teams build internal trust, lose trust, and earn it back. If you've ever had trust issues with your security team, you have to join us today at 1pm Eastern Time.
Steve Prentiss
We'll help you get to a better place.
Announcer
If that sounds good to you, head on over to our events page@cisoseries.com to register. And if you have some thoughts on
Steve Prentiss
the news from today or about this
Announcer
show in general, please be sure to reach out to us@feedbackisoseries.com we would love
Steve Prentiss
to hear from you. I'm Steve Prentiss reporting for the CISO series.
Narrator
Cybersecurity headlines are available every weekday. Head to CISoseries.com for the full stories behind the headlines.
This episode of Cybersecurity Headlines delivers top stories impacting the infosec landscape, focusing on major breaches, new malware tactics, urgent patch advisories, and evolving cybercriminal techniques. Key topics include a significant hospital data breach, federal vulnerability patch mandates, malware trends, and warnings about attacks leveraging popular messaging apps and real estate fraud.
[00:21–01:12]
Incident details:
Quote:
[01:12–01:39]
Federal urgency:
Quote:
[01:48–02:27]
Attack summary:
Quote:
[02:37–04:02]
Research insight:
Quote:
[04:02–04:33]
National warning:
Quote:
[04:33–05:35]
Technique evolution:
Quote:
[05:40–06:25]
Incident context:
Quote:
[06:27–07:33]
The episode maintains a brisk, fact-driven delivery characteristic of Cybersecurity Headlines. The tone is urgent but practical, emphasizing actionable information for security professionals and highlighting how evolving tactics and vulnerabilities are driving the threat landscape.