Cleartext logocleartext_
daily briefing

Cleartext – April 01, 2026

Wednesday, April 1, 2026·9:19

Cleartext – April 01, 2026
9:19·5.8 MB

Enjoy the show? Subscribe to never miss an episode.

show notes

Cleartext – April 01, 2026

Daily cybersecurity briefing for CISOs and security leaders.

🎧 Listen to this episode

Episode Summary

Today's episode covers 9 stories across 6 topic areas, including: Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069; Risky Bulletin: Iranian password sprays came first, then came the missiles; Iran Deploys 'Pseudo-Ransomware,' Revives Pay2Key Operations.

Stories Covered

🌍 Geopolitical

Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

The Hacker News · Apr 01 · Relevance: █████████░ 9/10

Why it matters to CISOs: A North Korean group compromised axios, which sits in ~80% of cloud environments with 100M+ weekly downloads — CISOs need immediate inventory of affected builds and credential rotation for any systems that pulled poisoned versions.

  • Google GTIG attributed the axios npm supply chain attack to North Korean threat actor UNC1069
  • Poisoned versions were live for ~3 hours; Huntress confirmed 135+ compromised systems within 89 seconds of publication
  • Axios has 100M+ weekly downloads and is present in approximately 80% of cloud and code environments

📖 Read full article

Risky Bulletin: Iranian password sprays came first, then came the missiles

Risky Business News · Apr 01 · Relevance: ████████░░ 8/10

Why it matters to CISOs: Iran's cyber operations are now directly preceding kinetic military action against Israel, signaling that enterprises in allied nations should treat Iranian password spraying as a leading indicator of escalation requiring immediate defensive posture changes.

  • Iranian password spraying campaigns targeted Israeli organizations ahead of physical missile strikes
  • Iran has reportedly threatened to bomb US tech firms operating in the Middle East
  • Pattern demonstrates cyber operations as precursors to kinetic military action

📖 Read full article

Iran Deploys 'Pseudo-Ransomware,' Revives Pay2Key Operations

Dark Reading · Mar 31 · Relevance: ████████░░ 8/10

Why it matters to CISOs: Iranian APTs are disguising destructive attacks as ransomware to target US organizations — CISOs need to ensure incident response plans account for state-sponsored wipers masquerading as financially motivated ransomware.

  • Iranian APTs are blurring lines between state-sponsored and cybercriminal activities
  • Pay2Key operations have been revived targeting high-impact US organizations
  • Pseudo-ransomware is being deployed as a cover for destructive state-sponsored operations

📖 Read full article

📡 Macro Trends

‘Missed opportunity’: US government’s absence from RSAC Conference leaves stark void

Cybersecurity Dive · Mar 31 · Relevance: ███████░░░ 7/10

Why it matters to CISOs: The US government's absence from RSAC signals a weakening public-private partnership at a time when CISOs depend on federal threat intelligence sharing and coordinated defense — this has strategic implications for incident response and information sharing programs.

  • The Trump administration chose not to attend the world's largest cybersecurity conference
  • Experts said the absence sent the wrong message to public and private sector partners
  • Raises concerns about the future of public-private cybersecurity collaboration

📖 Read full article

🔓 Data Breach

Cisco source code stolen in Trivy-linked dev environment breach

BleepingComputer · Mar 31 · Relevance: ████████░░ 8/10

Why it matters to CISOs: Cisco's own dev environment was breached through a supply chain attack on Trivy, demonstrating cascading risk from open-source tool compromises — CISOs must evaluate their own exposure to Trivy and review downstream credential hygiene.

  • Threat actors used stolen credentials from the Trivy supply chain attack to breach Cisco's internal dev environment
  • Source code belonging to Cisco and its customers was stolen
  • Highlights cascading supply chain risk from open-source security tooling compromises

📖 Read full article

Health data giant CareCloud says hackers accessed patients’ medical records

TechCrunch Security · Mar 31 · Relevance: ███████░░░ 7/10

Why it matters to CISOs: CareCloud serves 45,000+ providers covering millions of patients — any organization using CareCloud EHR needs to assess exposure and prepare for potential breach notification obligations under HIPAA.

  • CareCloud confirmed hackers accessed a repository of patient medical records in March
  • The company provides technology for more than 45,000 healthcare providers covering millions of patients
  • Incident involves protected health information subject to HIPAA breach notification requirements

📖 Read full article

⚖️ Governance & Policy

When Liability Turns the CISO Into the Fall Guy

BankInfoSecurity · Apr 01 · Relevance: ████████░░ 8/10

Why it matters to CISOs: Directly addresses the evolving personal liability exposure CISOs face post-breach, impacting how security leaders negotiate employment terms, D&O coverage, and board reporting structures.

  • Regulators are increasingly pursuing personal accountability against CISOs after major breaches
  • Rising liability is changing how security leaders report risk and weakening security culture
  • The CISO role is becoming less attractive to experienced practitioners due to legal exposure

📖 Read full article

🚀 Startup Ecosystem

AI SOC Firm Tenex Raises $250M to Drive Faster Response

BankInfoSecurity · Apr 01 · Relevance: ███████░░░ 7/10

Why it matters to CISOs: A $250M Series B for an AI SOC platform signals massive market conviction that autonomous detection and response is maturing — CISOs evaluating SOC modernization should track this category closely as it reshapes staffing and vendor decisions.

  • Tenex raised $250 million in Series B funding for its AI-driven SOC platform
  • Company plans to hire hundreds of engineers and expand alert coverage and automated response
  • Focus on reducing attacker dwell time while maintaining human oversight for complex threats

📖 Read full article

🚨 Critical Vulnerability

CISA tells federal agencies to patch Citrix NetScaler bug by Thursday

The Record (Recorded Future) · Mar 31 · Relevance: ████████░░ 8/10

Why it matters to CISOs: A CVSS 9.3 Citrix NetScaler vulnerability with an emergency CISA patching deadline means any enterprise running NetScaler needs to treat this as a drop-everything priority — Citrix remains one of the most targeted enterprise edge devices.

  • CISA issued emergency directive requiring federal agencies to patch by Thursday
  • The Citrix NetScaler vulnerability carries a severity score of 9.3/10
  • The bug enables threat actors to send requests that disclose sensitive information

📖 Read full article


Further Reading


Full Transcript

Click to expand full episode transcript

Jordan: A North Korean threat actor just poisoned axios — one hundred million downloads a week, present in eighty percent of cloud environments — and the malicious versions were live for three hours. Huntress confirmed a hundred and thirty-five compromised systems within eighty-nine seconds of the story dropping. If you haven't pulled your axios build inventory this morning, that's where this conversation starts.

Alex: Welcome to Cleartext. It's Wednesday, April 1st, 2026. I'm Alex Chen.

Jordan: And I'm Jordan Reeves. No April Fools — every story today is real, and most of them are going to require action on your part before end of day.

Alex: Here's what we're covering: North Korea's supply chain move against axios and what it means for your cloud posture. Iran is blurring the line between cyber operations and kinetic warfare — and blurring the line between ransomware and wiper attacks. Cisco got hit through its own dev tooling. CareCloud is a healthcare sector problem that has HIPAA breach notification written all over it. CISA just issued an emergency directive on a Citrix NetScaler vulnerability with a 9.3 CVSS score. The CISO liability conversation is heating up again. And we'll talk about what it means that the U.S. government didn't show up to RSAC. Let's get into it.

Jordan: The axios story is the one that should be commanding your morning. Google's Threat Intelligence Group formally attributed the npm supply chain compromise to UNC1069 — a North Korean cluster that GTIG characterizes as financially motivated. The poisoned versions were live for roughly three hours. That's a narrow window, but axios moves so fast that Huntress confirmed over a hundred and thirty-five compromised systems less than ninety seconds after publication. The vector here is the same playbook North Korea has been running against the developer ecosystem — get into the package, ride the CI/CD pipeline, harvest credentials from cloud environments. The difference is the blast radius. Axios isn't a niche library. It is the fabric of modern web application development.

Alex: And that's the business problem. When you're talking about a package present in eighty percent of cloud environments, you're not having a security conversation anymore — you're having a business continuity conversation. The first call this morning for a lot of CISOs should be to their engineering leads: which builds pulled axios during that three-hour window? What credentials were accessible in those environments? What secrets management practices were in place? If you have any uncertainty about those answers, credential rotation isn't optional — it's the floor. And your board needs to understand that supply chain risk at this scale is no longer theoretical. It's a quarterly operational reality.

Jordan: Let's stay in the geopolitical lane because Iran is giving us two separate but related stories that are worth reading together. The first is the pattern that Risky Business News surfaced today: Iranian password spraying campaigns against Israeli organizations directly preceded physical missile strikes. That is cyber as a kinetic precursor, not as a standalone operation. The second story is the revival of Pay2Key — Iranian APTs are deploying what looks like ransomware but functions as a destructive wiper. The ransom demand is cover. The real objective is destruction.

Alex: The implication for CISOs outside the immediate conflict zone is significant. If you're a U.S. enterprise with operations in the Middle East — or if Iran has threatened, as reported today, to target U.S. tech firms operating in that region — you need to treat Iranian password spray activity as a threat intelligence signal with escalatory potential, not just a credential hygiene problem. And the pseudo-ransomware point is critical for incident response planning. If your IR playbook assumes financial motivation when you see ransomware indicators, you may mis-triage a state-sponsored destructive attack. The initial containment decisions are different. The evidence preservation decisions are different. The regulatory notification timeline may be different. Update the playbook.

Jordan: Iran threatening to bomb U.S. tech firms in the Middle East and simultaneously running destructive malware campaigns that masquerade as ransomware — that is a threat actor operating with political cover and deniability at the same time. The blurring is intentional. It complicates attribution. It complicates the legal and insurance response. It's designed to.

Alex: Now let's talk about Cisco, because this one hits close to home for a lot of practitioners. Cisco's internal development environment was breached using credentials stolen in the Trivy supply chain attack. Source code belonging to Cisco and its customers was exfiltrated. The important word there is "customers." Trivy, for those who don't have it top of mind, is an open-source vulnerability scanner. It's security tooling. The lesson is brutal: the tools you use to secure your environment expand your attack surface if they're compromised. If Trivy is in your pipeline — and for many enterprises it is — you need to audit what credentials that tooling had access to, and you need to do that today.

Jordan: The cascading nature of supply chain attacks is the operational problem that doesn't get enough board-level airtime. It's not one compromised package. It's Trivy credentials becoming a vector into Cisco's dev environment, which then exposes customer source code. Each hop amplifies the damage. The original compromise may be far removed from where the material loss actually occurs.

Alex: Moving to healthcare — CareCloud confirmed that hackers accessed a repository of patient medical records in March. CareCloud serves over forty-five thousand healthcare providers covering millions of patients. If your organization is a CareCloud customer, you have a HIPAA breach notification obligation assessment to complete, and the clock is running. HIPAA requires notification within sixty days of discovering a breach. If CareCloud has notified you as a business associate, your legal and compliance teams need to be in the room now. If you haven't heard from them yet, reach out proactively. Don't wait for the letter.

Jordan: Quick one on Citrix — CISA issued an emergency directive requiring federal agencies to patch a NetScaler vulnerability by Thursday. CVSS 9.3. The bug allows attackers to craft requests that disclose sensitive information. Citrix edge devices have been primary targets for nation-state and criminal actors for the better part of three years. If you're running NetScaler, this isn't a "schedule it for the next patch window" situation. The federal deadline is tomorrow. Treat it as yours too.

Alex: Now — the CISO liability story from BankInfoSecurity today is one I want to spend a moment on because it speaks directly to everyone listening. The piece lays out how rising regulatory accountability is reshaping the role — not just the personal legal exposure, but the downstream effect on how CISOs communicate risk. When you know you can be personally named in an SEC enforcement action or a DOJ investigation, the incentives around board reporting shift. There's a real risk that CISOs start softening the message to reduce personal exposure. That's catastrophic for security culture.

Jordan: The talent implications are real too. Experienced practitioners are evaluating whether the personal liability profile of this role is worth it. That is not a hypothetical — that is a conversation happening in every executive recruiting process right now.

Alex: If you're in contract negotiations or renewal discussions, D&O coverage language matters. Indemnification clauses matter. Your reporting structure matters — whether you have a direct line to the board or are filtered through a CIO who owns the risk narrative. These are not HR details. They're legal and strategic decisions.

Jordan: Brief note on the RSAC absence — the Trump administration chose not to attend the world's largest cybersecurity conference. The public-private partnership model that built CISA's threat intelligence sharing programs, that made sector-specific ISACs functional, that enabled coordinated response during major incidents — that model depends on government showing up. When they don't, the signal to allies and to the private sector is not subtle.

Alex: For CISOs, the practical implication is this: don't assume federal threat intelligence pipelines will be as robust or as timely going forward. Diversify your intel sources. Lean into industry ISACs and commercial threat intelligence. The operational relationships you've built with FBI field offices and CISA regional advisors are worth maintaining — but don't make them your primary dependency.

Jordan: On the funding side — Tenex raised two hundred and fifty million in a Series B for its AI-driven SOC platform. The thesis is autonomous detection and response with human oversight reserved for complex threats. Two-fifty at Series B is a significant market signal. The AI SOC category is moving from pilot to production conversation for a lot of enterprises.

Alex: If you're in a SOC modernization cycle or evaluating MSSP contracts, this category deserves a structured evaluation. The staffing economics and the dwell time reduction claims are both compelling on paper. Validate them against your environment before you sign anything.

Jordan: Looking at the week as a whole, the theme is convergence. Supply chain risk converging with nation-state objectives. Cyber operations converging with kinetic military action. Destructive attacks converging with ransomware tradecraft. The clean categorical boundaries that organized our defenses — nation-state versus criminal, espionage versus destruction, IT versus OT — are dissolving. That has real implications for how you build detection, how you draft IR playbooks, and how you present risk to your board.

Alex: The board conversation has to evolve with it. Threat actors aren't respecting the org chart of your risk framework, and your reporting shouldn't either. The axios story alone is a case for revisiting software supply chain as a board-level agenda item — not as a technology appendix, but as a strategic risk with direct revenue and liability implications.

Jordan: The three action items leaving this episode: one, axios build inventory and credential rotation if you have any exposure to the poisoned window. Two, Citrix NetScaler patch — treat Thursday as your deadline, not just the federal government's. Three, if Trivy is in your pipeline, audit its credential access scope today.

Alex: That's Cleartext for Wednesday, April 1st. We'll be back tomorrow. If this was useful, share it with a peer who needs it. Stay sharp.


Cleartext is an automated daily podcast for CISOs and security leaders. Generated 2026-04-01.

Sources are pulled from: CyberScoop, The Record, SecurityWeek, Krebs on Security, Dark Reading, Cybersecurity Dive, BleepingComputer, Wired, Ars Technica, TechCrunch, Help Net Security, VentureBeat, Risky Business News, The Hacker News, CISA, and BankInfoSecurity.