Archive snapshot

Mon, Apr 13 · 06:00 AM CDT

Archived briefing content rendered inside the ACSP site experience.

Archived briefing

Snapshot overview

Generated Mon, Apr 13 · 06:00 AM CDTWindow last 6 hours

Top line

Coverage now updates on a rolling 6-hour window, while NVD entries come from the live API using a last-24-hours modified window and are sorted by severity.

Fast take

News stays on the current 6-hour slice, videos now use the last 24 hours, and NVD uses the API instead of the traditional feed to better match the live site behavior.

Top stories
8
Worth skimming
0
Tracked videos
0
NVD vulnerabilities
25

Top stories

Mon, 13 Apr 2026 14:45:00 +0530

North Korea's APT37 Uses Facebook Social Engineering to Deliver RokRAT Malware

9.4/10 · Must read/watch
The Hacker Newsmalwareai

Summary
The North Korean hacking group tracked as APT37 (aka ScarCruft) has been attributed to a fresh multi-stage, social engineering campaign in which threat actors approached targets on Facebook and added them as friends on the social media platform, turning t

Mon, 13 Apr 2026 12:20:00 +0530

OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident

9.4/10 · Must read/watch
The Hacker Newssupply-chainai

Summary
OpenAI revealed a GitHub Actions workflow used to sign its macOS apps led to the download of the malicious Axios library on March 31, but noted that no user data or internal system was compromised. "Out of an abundance of caution, we are taking steps to protec

Mon, Apr 13 · 06:00 AM CDT

Bitcoin Depot Reports $3.6m Crypto Theft After System Breach

8.1/10 · Worth your time
Infosecurity Magazinegeneral

Summary
Collected from the Infosecurity Magazine news page during the latest run.

Mon, Apr 13 · 06:00 AM CDT

Google Chrome Rolls Out Protection Against Infostealers Targeting Session Cookies

8.0/10 · Worth your time
Infosecurity Magazinemalwareai

Summary
Collected from the Infosecurity Magazine news page during the latest run.

Mon, Apr 13 · 06:00 AM CDT

Google API Keys Quietly Gain Access to Gemini on Android Devices

8.0/10 · Worth your time
Infosecurity Magazineai

Summary
Collected from the Infosecurity Magazine news page during the latest run.

Mon, Apr 13 · 06:00 AM CDT

Critical Vulnerability in Ninja Forms Exposes WordPress Sites

8.0/10 · Worth your time
Infosecurity Magazinevuln

Summary
Collected from the Infosecurity Magazine news page during the latest run.

Mon, Apr 13 · 06:00 AM CDT

Just Three Ransomware Gangs Accounted for 40% of Attacks Last Month

7.8/10 · Worth your time
Infosecurity Magazinemalware

Summary
Collected from the Infosecurity Magazine news page during the latest run.

Mon, Apr 13 · 06:00 AM CDT

Governance Gaps Emerge as AI Agents Drive 76% Increase in NHIs

7.8/10 · Worth your time
Infosecurity Magazineai

Summary
Collected from the Infosecurity Magazine news page during the latest run.

Worth skimming

Nothing surfaced yet.