Archive snapshot

Thu, Apr 09 · 12:00 PM CDT

Archived briefing content rendered inside the ACSP site experience.

Archived briefing

Snapshot overview

Generated Thu, Apr 09 · 12:00 PM CDTWindow last 6 hours

Top line

Coverage now updates on a rolling 6-hour window, while NVD entries come from the live API using a last-24-hours modified window and are sorted by severity.

Fast take

News stays on the current 6-hour slice, videos now use the last 24 hours, and NVD uses the API instead of the traditional feed to better match the live site behavior.

Top stories
8
Worth skimming
0
Tracked videos
2
NVD vulnerabilities
25

Top stories

Thu, 09 Apr 2026 21:53:00 +0530

UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns

9.4/10 · Must read/watch
The Hacker Newsmalwareaipolicy

Summary
A previously undocumented threat cluster dubbed UAT-10362 has been attributed to spear-phishing campaigns targeting Taiwanese non-governmental organizations (NGOs) and suspected universities to deploy a new Lua-based malware called LucidRook. "LucidRook i

Thu, 09 Apr 2026 16:45:00 +0530

Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025

9.4/10 · Must read/watch
The Hacker Newsvulnai

Summary
Threat actors have been exploiting a previously unknown zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December 2025. The finding, detailed by EXPMON's Haifei Li, has been described as a highly-sophistic

Thu, Apr 09 · 12:00 PM CDT

Bitcoin Depot Reports $3.6m Crypto Theft After System Breach

9.0/10 · Must read/watch
Infosecurity Magazinegeneral

Summary
Collected from the Infosecurity Magazine news page during the latest run.

Thu, 09 Apr 2026 12:26:50 +0000

Google API Keys in Android Apps Expose Gemini Endpoints to Unauthorized Access

8.9/10 · Worth your time
SecurityWeekaiidentity

Summary
Dozens of such keys can be extracted from apps’ decompiled code to gain access to all Gemini endpoints. The post Google API Keys in Android Apps Expose Gemini Endpoints to Unauthorized Access appeared first on SecurityWeek .

Thu, Apr 09 · 12:00 PM CDT

Middle East Hack-for-Hire Operation Traced to South Asian Cyber Espionage Group

8.6/10 · Worth your time
Infosecurity Magazinegeneral

Summary
Collected from the Infosecurity Magazine news page during the latest run.

Thu, 09 Apr 2026 17:01:00 +0530

The Hidden Security Risks of Shadow AI in Enterprises

8.6/10 · Worth your time
The Hacker Newsai

Summary
As AI tools become more accessible, employees are adopting them without formal approval from IT and security teams. While these tools may boost productivity, automate tasks, or fill gaps in existing workflows, they also operate outside the visibility

Thu, 09 Apr 2026 13:43:07 +0000

Apple Intelligence AI Guardrails Bypassed in New Attack

8.6/10 · Worth your time
SecurityWeekai

Summary
RSAC researchers hacked Apple Intelligence using the Neural Exect method and Unicode manipulation. The post Apple Intelligence AI Guardrails Bypassed in New Attack appeared first on SecurityWeek .

Thu, 09 Apr 2026 13:30:00 +0000

Can we Trust AI? No – But Eventually We Must

8.6/10 · Worth your time
SecurityWeekai

Summary
From hallucinations and bias to model collapse and adversarial abuse, today’s AI is built on probability rather than truth, yet enterprises are deploying it at speed without fully understanding the risks. The post Can we Trust AI? No – But Eventually We Must a

Worth skimming

Nothing surfaced yet.