SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsVercel, the cloud platform-as-a-service (PaaS) company known for creating and maintaining the Next.js framework, published a security bulletin on April 19 disclosing a security incident. An attacker took over a Vercel employee's Google Workspace account through a compromise in a third-party OAuth application made by Context.ai, a supplier of enterprise AI agents, and then escalated access to internal Vercel systems. Vercel CEO Guillermo Rauch stated on social media that while "Vercel stores all customer environment variables fully encrypted at rest," the attacker's unauthorized access included "non-sensitive" environments and variables. The company has implemented additional security measures and monitoring, and is working with "Mandiant, additional cybersecurity firms, industry peers, and law enforcement," as well as working directly with Context.ai to investigate the scope of compromise. Vercel has contacted individuals whose Vercel credentials were compromised in the attack, and recommends users set Deployment Protection to "Standard" or higher, rotate Deployment Protection Tokens and environment variables and designate secrets as "sensitive," and review recent deployments and the activity log. A concurrent report from Hudson Rock assesses that a February 2026 Lumma infostealer attack on Context.ai may have precipitated this breach. Both Hudson Rock and Vercel recommend all users of Context.ai in Google Workspace search for the malicious app ID in the Google Admin Console's API controls and immediately revoke access before initiating incident response.

While this is a third-party compromise, indicating there are some things out of your control, Vercel has identified steps you can take to raise the bar in your environment. These include MFA, best practices for environment variables, activity log review, as well as deployment protection and rotating deployment protection settings and tokens. Lastly, make sure you've got the OAuth IoC, just in case.

Vercel is one of the newest competitors in this cloud space. I am not sure whether they are considered NeoCloud or PaaS, but they are popular. They mostly compete with AWS and Cloudflare on Lambda Layers. This will be an interesting one to watch as they are a very new provider in the space and very popular. They also handle Next.js, which is very popular with web developers.
A classic supply chain attack, enabled by credential harvesting. While we talk about validating the cybersecurity programs of third-party providers, you must also focus on what happens once they gain access. Credential theft is table stakes these days. What tools are you using to monitor for abnormalities in typical user behavior?
Vercel
Hudson Rock
The Hacker News
BleepingComputer
SecurityWeek
The Register
The US Cybersecurity and Infrastructure Security Agency (CISA) has added a 13-year-old vulnerability in Apache ActiveMQ Classic to the Known Exploited Vulnerabilities (KEV) catalog. The improper input validation / code injection vulnerability (CVE-2026-34197) affects Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The issue was discovered by researchers at Horizon3, who wrote that the flaw allows "an attacker [to] invoke a management operation through ActiveMQ’s Jolokia API to trick the broker into fetching a remote configuration file and running arbitrary OS commands, ... [and that] the vulnerability requires credentials, but default credentials (admin:admin) are common in many environments." Apache ActiveMQ, an open-source Java message broker, debuted in 2004. Horizon3 researchers were able to use Anthropic's Claude AI assistant to detect the vulnerability, which was "hiding in plain sight for 13 years." US Federal Civilian Executive Branch (FCEB) agencies have until Thursday, April 20 to mitigate the issue.

Improper input validation, the gift that keeps on giving. Good on Horizon3 for leveraging AI capabilities to find an old flaw. That this flaw has existed for 13 years provides some insight as to how hard it is to identify and fix all input to be properly validated. You need to update to ActiveMQ 5.19.4 or 6.2.3. Then look for default credentials (e.g., admin:admin). Yes, the attack requires credentials; there are a lot of default credentials in ActiveMQ environments, effectively rendering it an unauthenticated attack.
The Register
Heise
SC Media
Horizon3
NVD
Three zero-day vulnerabilities in Microsoft Defender are reportedly being actively exploited. An individual has recently posted proof-of-concept exploits for all three. Researchers at Huntress say they are "observing the use of [the individual's] BlueHammer, RedSun, and UnDefend exploitation techniques." BlueHammer and RedSun are local privilege escalation vulnerabilities; UnDefend could be exploited to cause denial-of-service conditions and block definition updates. The PoC exploit for BlueHammer was released on April 3, and Microsoft addressed the vulnerability in its Patch Tuesday release last week, describing it (CVE-2026-33825) as being due to insufficient granularity of access control, and giving it a severity rating of Important. PoC exploits for RedSun and UnDefend were released on April 16.

“Broken Access Controls” have been number one on the OWASP Software Vulnerability Top 10 for several years. I’d like to see Microsoft put out an after-action report on how this got through to production code.

CVE-2026-33825 has a CVSS score of 7.8, and is fixed with Defender 4.18.26030.3011 and above. The update (released April 14) should be automatically deployed, so this shouldn't be hard to address, but just don't let it slide as the weakness is being exploited.
Social media platform Bluesky reported on April 16, 2026 that "intermittent app outages" starting the night before were the result of a distributed denial-of-service (DDoS) attack, which the company was working to mitigate. Users experienced intermittent interruption of feeds, notifications, threads, and search functions. Additional updates state that the attacks are ongoing, but the application has remained stable since 9pm PDT on April 16, and there has been no evidence of unauthorized access to private user data. The company has not confirmed attribution nor other details of the attack, and promises additional updates.

If you're wondering how to justify DDoS protections before they are needed, Bluesky is a great example of what it's like to be under a sustained DDoS attack and trying to mitigate that attack while it's underway. Don't overlook the fact that even with mitigations, some underlying services still need time to recover, possibly needing restarts. Also take a look at stories about users moving to competing services that are not currently impacted. Consider whether that should be part of your BCP conversation. I'm hoping Bluesky publishes information we can leverage in our own shops.

For a social media platform, a press release about a DDoS attack is kinda like an actor saying, “You like me, you really like me!” when they receive an Academy Award…
It’s hard to believe that DDoS attacks have been around for 30+ years and yet they’re still a problem. Witness the recent LE Operation PowerOFF targeting DoS service providers. ISPs can and should do more to mitigate; unfortunately, they lack the financial incentive, putting the responsibility back on their customers to protect themselves.
During the week of April 13, 2026, Europol's Operation PowerOFF carried out four arrests, took down 53 domains, issued 25 search warrants, and sent over 75,000 warnings against users of platforms offering distributed-denial-of-service (DDoS) attacks for hire. Authorities from 21 countries seized booter services infrastructure, which disrupted DDoS-for-hire operations and yielded information on over three million users of the service. Domains taken offline included "Quantum-stress, Stresse, Unknownstresser, Vacstresser, dreams-stresser, Mythicalstress and others," according to documents from the US Department of Justice (DoJ). Operation PowerOFF has been ongoing since 2018.

Anyone else thinking of the big red EPO button in the data center? Seriously, good on Europol, DoJ, and all the other participating authorities. It's been a minute since we've talked about DDoS; DDoS is going to remain an attack vector as long as it works. You can impact this by making sure that your protections are (still) in place, particularly for new services or services which didn't have a solution when you last checked. Be sure to ask for any reporting capability — particularly real-time — because you want visibility for your defenders.
First kudos to law enforcement: well done. That said, let’s face it, cybercrime is big business these days. More and more we see clear examples where parts of the hacker's ecosystem is being commoditized and offered as a service to others with illegal intent. Law enforcement will have to continue to adapt, the bad guy isn’t slowing down.
Europol
The Record
CyberScoop
SecurityWeek
BleepingComputer
Europa
Financial institutions conducting business within the state of New York faced a deadline last week for attesting to their adoption of multifactor authentication and affirming that they are keeping accurate inventories of their IT assets, including an up-to-date list of devices and plans for end-of-life management for those devices. The April 15, 2026 deadline is the last of several requirements established by 2023 amendments to New York's Cybersecurity Rule. Cybersecurity requirements already implemented include a 72-hour window for reporting cybersecurity incidents, improved vulnerability management practices, and stronger governance.

These requirements should be table stakes for all of us: (phishing resistant) MFA, accurate inventory, lifecycle management, vulnerability management, governance, and appropriate incident reporting in a timely fashion. Even if you're not obligated by regulators, rest assured you will be reporting incidents to management and beyond. Remember, these are intended as minimums based on risks from when the legislation was drafted, so you should be reviewing current threats and raising the bar accordingly. For example, we shouldn't just be implementing MFA; we should already have or be upgrading to phishing resistant MFA.

There’s been plenty of warning on this move, and both MFA and asset inventory are universally needed to protect customers. It is past time for fines and legal actions for non-compliance.
While financial institutions might bellyache about the *new* cybersecurity requirements, they are all safeguards that are part of implementation group one (IG1) of the CIS Critical Security Controls. IG1 is the definition of essential cyber hygiene and represents a minimum standard of information security for all enterprises. https://www.cisecurity.org/controls/implementation-groups/ig1
Gov Infosecurity
NY Department of Financial Services
Later this week, researchers at Forescout will present their findings on vulnerabilities in serial-to-IP converters at Black Hat Asia in Singapore. Forescout notes that "in 2015, an attack against Ukrainian power companies intentionally corrupted the firmware of several vulnerable serial-to-IP servers, rendering electrical substations inoperable and causing power outages." The researchers' findings are based on analysis of "firmware from five major vendors [that turned up] outdated components, n-day vulnerabilities and a lack of binary hardening similar to those in less critical devices, ... [and] an in-depth analysis of several devices from two major vendors often used in healthcare and OT environments," finding 23 new vulnerabilities. Among those are eight vulnerabilities in Lantronix EDS3000PS and EDS5000, which the US Cybersecurity and Infrastructure Security Agency (CISA) described in a March 10, 2026 Industrial Control Systems (ICS) Advisory. Forescout also found 12 vulnerabilities in Silex SD-330AC; Silex has published an associated security advisory.

The flaws, when assigned a CVE, have high (9.8-10.0) CVSS scores, so we need to make sure everything is properly deployed. These types of devices, which are actually pretty cool for the teams using them, should fall under your IoT/OT protections, and as such should be isolated, not easily reached for any attempted exploit, and particularly not Internet accessible. While you're at it, seek to understand the use cases; it's good to know the problems these are solving.
24-year-old Tyler Robert Buchanan, who was arrested in June 2024 and charged five months later in connection with cybercrime by the Scattered Spider hacking group, has pleaded guilty in California court to one count of conspiracy to commit wire fraud and one count of aggravated identity theft. According to the US Department of Justice (DoJ), Buchanan and co-conspirators conducted cyber intrusions and stole virtual currency, defrauding "at least a dozen companies and their employees as well as individual victims throughout the U.S." The group's tactics included SMS phishing that led to the compromise of company systems and the theft of "confidential work product, intellectual property, and PII such as account access credentials, names, email addresses, and telephone numbers." The group also conducted SIM swapping to take over targeted mobile devices, bypassing two-factor authentication and allowing access to accounts including virtual currency wallets. "Buchanan admitted in his plea agreement that the scheme involved the theft of at least $8 million worth of virtual currency assets from individual victims located throughout the United States." One co-conspirator is already serving a 10-year sentence in US federal prison and will pay $13 million in restitution, and three other defendants have yet to be sentenced. Buchanan's sentencing hearing will take place on August 21, 2026, and the statutory maximum for his charges is 22 years in federal prison.

This is a good example of why using SMS for authentication is a bad idea. While I agree SMS is better than single-factor authentication, it's still risky, and you should be moving past it. It's likely that your authentication services have matured, adding newer authentication options you can deploy easily. Avoid the lure of enabling SMS fallback, as that doesn't eliminate the path to insecure authentication.
Krebs on Security
DOJ
The Record
SecurityWeek
BleepingComputer
The location of a Dutch navy vessel was exposed for roughly 24 hours after a postcard containing a Bluetooth tracker was sent to the ship. The Dutch Ministry of Defense had posted instructions for sending mail to sailors and soldiers; journalist Just Vervaart took advantage of that information to send the gadget embedded in the postcard. The tracker reportedly remained active for a day. Dutch Defense officials say the device was detected and disabled during mail sorting. While packages sent to members of the Dutch armed forces are routinely scanned, envelopes were not. The Ministry says it is changing that policy and will now ban cards containing batteries.

This story indicates the complexity of maintaining operational security with a backdrop of modern technology. Remember the aircraft carrier and "secret" military bases discovered by the use of fitness trackers used by soldiers running the perimeter? While we may not be conducting sensitive operations, we do have sensitive information, and we need to continuously monitor our controls to ensure it's not easily exfiltrated. I'm remembering claims stating that while information was strongly secured (access, in-transit and storage) one need only take a screenshot with their cell phone, which now often includes OCR capabilities. Also consider the use case of processing corporate information on personally owned devices. Are your protections up to speed with the current risks in either of these scenarios?
France's Interior Ministry has disclosed a that cybersecurity incident affecting the country's National Agency for Secure Documents (ANTS) may have compromised personal information. ANTS processes passport, national identity card, residence permit, and driver's license applications. The Ministry says the incident, which was detected on Wednesday, April 15, may affect both personal and professional accounts on the ANTS portal.

The ANTS compromise is one of metadata rather than the sensitive attached documents themselves. So, while the data can't be used to access ANTS, that data includes sufficient information for ID theft/profiling, and users should take protective steps.
The Record
French Ministry of the Interior
SANS Internet Storm Center StormCast Tuesday, April 21, 2026
CVE and EPSS; Windows Server 2025 OOB; QEMU Abuse
https://isc.sans.edu/podcastdetail/9900
Handling the CVE Flood With EPSS
https://isc.sans.edu/diary/Handling+the+CVE+Flood+With+EPSS/32914
Windows Server 2025 Out of Band Patch
https://learn.microsoft.com/en-us/windows/release-health/windows-message-center#4835
QEMU abused to evade detection and enable ransomware delivery
https://www.sophos.com/en-us/blog/qemu-abused-to-evade-detection-and-enable-ransomware-delivery
SANS Internet Storm Center StormCast Monday, April 20, 2026
Lumma Stealer and Sectop RAT; Windows 0-Day Exploited; NIST NVD Update; FortiSandbox PoC
https://isc.sans.edu/podcastdetail/9898
Lumma Stealer infection with Sectop RAT (ArechClient2)
https://isc.sans.edu/diary/Lumma+Stealer+infection+with+Sectop+RAT+ArechClient2/32904
Three Recent Windows Defender Vulnerabilities Exploited (one 0-day)
https://x.com/HuntressLabs/status/2044882115574091960
FortiSandbox PoC Exploit CVE-2026-39808
https://github.com/samu-delucas/CVE-2026-39808?tab=readme-ov-file
NIST Updates NVD Operations to Address Record CVE Growth
https://www.nist.gov/news-events/news/2026/04/nist-updates-nvd-operations-address-record-cve-growth
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
The Gartner® Magic Quadrant™ is one of the most trusted benchmarks in tech. Optro (formerly AuditBoard) has been named a Leader in the 2026 Gartner® Magic Quadrant™ for Third-Party Risk Management Tools for Assurance Leaders and placed furthest to the right on Completeness of Vision. This recognition comes just months after Optro was named a Leader in the 2025 Magic Quadrant™ for GRC Tools, Assurance Leaders.
SANS Survey on Unstructured Data | Take this survey to benchmark your organization, share insights, and influence better tools, strategies, and security for unstructured data risks.
Webinar | When Trusted Senders Become Threats: Stopping BEC and Supply Chain Attacks with Self‑Learning AI | Monday, April 27 at 10:30 AM ET
Webinar | Risk-Adaptive DLP Strategy Guide | Monday, May 18, 2026 at 3:30PM