
Loading summary
A
The FBI extracted signal chats from iPhone notification logs, Los Angeles police data was leaked online, A former Meta employee is under investigation for downloading private photos, and an Adobe Reader Zero Day is being exploited in the wild. This is the risky bulletin prepared by Katalin Kim Panu and read by me, Claire aird. Today is the 10th of April and this podcast episode is brought to you by Airlock. In today's top story, the FBI has extracted signal messages from a suspect's device after the app had been deleted. The information was extracted from the iPhone's database of previous notifications. According to 404 Media, the case was related to anti ICE protests in Texas. In other news, hackers have published data from the Los Angeles City Attorney's Office. The stolen data includes sensitive case details and and the personal information of police officers. Witness names, medical records and internal affairs investigations are also included in the 7.7 terabytes of data published online this week. A hacker has stolen petabytes of sensitive data from China's National Supercomputing Centre. The data was published online last month, but it took weeks for investigators to confirm its authenticity. Some leaked files appear to contain military and government data. A new group calling itself Flaming China has taken credit for the hack. Hackers have stolen $3.6 million from Bitcoin Depot, a crypto ATM operator. The attack took place last month and targeted the company's crypto wallets. Bitcoin Depot operates more than 25,000 crypto ATMs globally. A ransomware attack has hit a software provider for the Dutch healthcare sector. The incident targeted ChipSoft, which makes an electronic patient record management platform called Hicks. The incident did not impact the platform's availability. According to reports, Hicks is used by about 70% of Dutch hospitals. The National Guard cyber units have been deployed to Minnesota's Winona county following a cyber attack. The attack this week disrupted IT networks and public services. The same county was hit by ransomware in late July. This is a separate incident. According to the record, a cyber attack has taken down vehicle fleet management platform fleetwave. The incident impacted several local governments in the US that use the platform to manage shared cars. The software is used to assign vehicles to workers, schedule maintenance and manage fuel and repair logs. Microsoft has suspended developer accounts of three software VeraCrypt, WireGuard and Windscribe have not been able to sign drivers or or ship updates for at least a week. The issue is believed to be related to Microsoft's Driver Developer account verification process, which was introduced last year. Veracrypt and Windscribe developers have since said the issue's being resolved with Microsoft. A new Geo tracking tool that uses advertising data is being deployed by Hungary, the US and El Salvador. The Web block tool was developed by Israeli surveillance vendor Cobwebs. It it's now sold by its successor, Penlink. The platform can reportedly build profiles to track entire populations. Its customers include law enforcement and intelligence agencies. The U.S. treasury Department has established a threat intel sharing group for the cryptocurrency and digital assets industries. Market participants will receive alerts about ongoing cybersecurity threats. The initiative is a response to the frequency of cryptocurrency platform hacks and the losses they cause. The former Trenchant executive who sold the company's iOS exploits said he had financial difficulties at the time. Peter Williams pleaded guilty this year to selling company secrets to a Russian broker. He was sentenced in February. Before sentencing, Williams wrote to a D.C. court judge. That letter has recently been cited by Kim Zeta. In it, Williams also said he was suffering from stress and burnout at the time of his crime. He he described his actions as extraordinarily poor judgement. Williams was sentenced to 87 months in prison. UK police are investigating a former Meta employee over downloading photos of Facebook users. The suspect is accused of creating a script bypassing Facebook's defences, which was used to download more than 30,000 private photos. He was fired last year when Meta discovered the hack and reported the case to authorities. An Adobe Reader Zero Day has been exploited in the wild since at least November. The attacks used LUA documents related to Russia's oil and gas sector. No formal attributions or patch are available. A newly discovered IoT botnet avoids infecting US government and military networks. Security firm Trellix believes the Mass Gesu botnet's use of IP blocklists is to avoid triggering a US law enforcement response. The botnet has been active for almost three years and is primarily used as a DDoS for hire service. Hackers have compromised the service of a plugin developer and shipped malware to WordPress and Joomla sites. Malicious updates containing a remote access tool were delivered to sites running the Smart Slider plugin. The incident occurred on Tuesday and the update was live for six hours. The plugin's developer, NextEnd, has traced the incident to a hack of its update servers. Akamai and cloudflare have voiced their support for an open registry for AI agents known as the Agent Name Service. The standard assigns unique identifiers to AI crawlers that can be used to authorise them to access resources. The system's modelled after DNS and every identity is cryptographically signed. And finally, the Greek government will enforce a social media ban for children under the age of 15. When the law takes effect next year, Greece will be the first European country to implement a social media age restriction. France, Spain and Denmark are considering similar bans. And that is all for this podcast edition. Today's show was brought to you by Airlock Digital. Find them@airlockdigital.com thanks for your company.
Podcast: Risky Bulletin
Host: Risky Business Media
Date: April 10, 2026
This episode delivers a rapid-fire roundup of the week's top cybersecurity news, with headline stories including the FBI's extraction of deleted Signal messages via iPhone notification logs, major government and private sector data breaches, emerging cyber threats, and legal actions within the cybersecurity industry. The reporting is direct, concise, and focused on recent high-impact events affecting law enforcement, technology firms, and the general public.
On FBI Data Extraction:
"The FBI has extracted signal messages from a suspect's device after the app had been deleted. The information was extracted from the iPhone's database of previous notifications." ([00:10])
On Public Sector Data Breach:
"The stolen data includes sensitive case details and and the personal information of police officers. Witness names, medical records and internal affairs investigations are also included..." ([01:15])
On Trenchant Betrayal:
"He described his actions as extraordinarily poor judgement." (Peter Williams letter, cited by Kim Zetter) ([04:47])
On Zero-Day Exploitation:
"An Adobe Reader Zero Day has been exploited in the wild since at least November. The attacks used LUA documents related to Russia's oil and gas sector." ([04:51])
This Risky Bulletin gives a succinct, news-driven overview of ongoing cyber threats, law enforcement actions, and policy shifts affecting the tech and digital security landscape globally. Each item is grounded in current reporting, with key concerns around data persistence, critical infrastructure security, insider threats, and the interplay between technical vulnerabilities and regulatory actions. The language is factual, urgent, and accessible for both IT professionals and the broader public.