Cleartext – April 22, 2026
Wednesday, April 22, 2026·8:49
Enjoy the show? Subscribe to never miss an episode.
show notes
Cleartext – April 22, 2026
Daily cybersecurity briefing for CISOs and security leaders.
Episode Summary
Today's episode covers 9 stories across 5 topic areas, including: UK cyber agency handling four major incidents a week as nation-state attacks surge; Pentagon Cyber Leaders Back $1.5T Budget Request; Mozilla: Anthropic's Mythos found 271 security vulnerabilities in Firefox 150.
Stories Covered
🌍 Geopolitical
UK cyber agency handling four major incidents a week as nation-state attacks surge
The Record (Recorded Future) · Apr 22 · Relevance: ████████░░ 8/10
Why it matters to CISOs: The NCSC's disclosure that the UK faces four nationally significant incidents weekly—predominantly from nation-states rather than criminals—signals a material shift in the threat landscape that should inform board-level risk discussions and resilience planning.
- UK NCSC handling four nationally significant cyber incidents per week
- Majority of incidents now traced to hostile foreign governments rather than criminal hackers
- Warning frames converging geopolitical tensions and tech advances as a 'perfect storm'
Pentagon Cyber Leaders Back $1.5T Budget Request
BankInfoSecurity · Apr 22 · Relevance: ███████░░░ 7/10
Why it matters to CISOs: The DoD positioning cyber as a core warfighting domain with expanded offensive operations signals increased government activity in cyberspace—CISOs should anticipate both tighter defense-sector compliance requirements and a more contested threat environment as adversaries respond.
- Defense officials told Congress the budget positions cyber as a core warfighting domain
- Funding covers expanded offensive operations, AI-driven capabilities, and Cyber Command overhaul
- Adversaries described as shifting from espionage to pre-positioned disruptive attacks
📡 Macro Trends
Mozilla: Anthropic's Mythos found 271 security vulnerabilities in Firefox 150
Ars Technica Security · Apr 21 · Relevance: ████████░░ 8/10
Why it matters to CISOs: An AI model finding 271 vulnerabilities in a major browser signals that both defenders and attackers now have access to autonomous vulnerability discovery at scale—CISOs must factor AI-accelerated exploit timelines into their patching and risk models.
- Anthropic's Mythos AI model discovered 271 security vulnerabilities in Firefox 150
- Mozilla CTO called the model 'every bit as capable' as world's best security researchers
- Raises strategic concerns about attackers using similar AI models for offensive vulnerability discovery
Three AI coding agents leaked secrets through a single prompt injection. One vendor's system card predicted it
VentureBeat Security · Apr 21 · Relevance: ███████░░░ 7/10
Why it matters to CISOs: Prompt injection attacks causing Claude Code, Gemini CLI, and Copilot Agent to leak API keys via GitHub PRs demonstrate that AI coding agents are a live attack surface—CISOs must establish guardrails around AI agent integrations in CI/CD pipelines.
- Prompt injection in a GitHub PR title caused Claude Code, Gemini CLI, and Copilot Agent to leak their own API keys
- Attack dubbed 'Comment and Control' requires no external infrastructure
- Workflows using pull_request_target trigger, common for AI agent integrations, expose secrets to fork PRs
🔓 Data Breach
Vercel breach exposes the OAuth gap most security teams cannot detect, scope or contain
VentureBeat Security · Apr 21 · Relevance: ████████░░ 8/10
Why it matters to CISOs: This supply-chain breach via an unreviewed third-party AI tool OAuth grant illustrates a growing blind spot: shadow AI integrations creating unmonitored paths into production environments. CISOs need to audit OAuth grants and third-party AI tool access immediately.
- Vercel confirmed unauthorized access to internal systems through an employee-adopted AI tool whose vendor was compromised via infostealer
- Mandiant engaged and law enforcement notified; Vercel now defaults environment variables to 'sensitive'
- No Vercel npm packages were compromised after joint verification with GitHub, Microsoft, npm, and Socket
CISA urges security teams to view environments following axios compromise
Cybersecurity Dive · Apr 21 · Relevance: ████████░░ 8/10
Why it matters to CISOs: A suspected North Korea-linked supply chain attack on the widely used axios JavaScript library demands immediate action from security teams to audit dependencies and check for indicators of compromise across development and production environments.
- CISA issued urgent guidance following compromise of the widely used axios library
- Suspected North Korea-linked actor behind the supply chain attack
- CISA urges security teams to review their environments for signs of compromise
⚖️ Governance & Policy
Lawmakers ponder terrorism designations, homicide charges over hospital ransomware attacks
CyberScoop · Apr 21 · Relevance: ████████░░ 8/10
Why it matters to CISOs: Terrorism designations for ransomware groups targeting hospitals would fundamentally alter the legal landscape—triggering new sanctions, insurance implications, and potentially making ransom payments a federal crime. Healthcare CISOs and their legal teams need to track this closely.
- House Homeland Security Committee hearing discussed terrorism designations and homicide charges for ransomware actors targeting hospitals
- Former FBI official endorsed terrorism classification for groups attacking healthcare
- Healthcare ransomware attacks continue to rise in frequency and severity
Former DigitalMint ransomware negotiator pleads guilty to extortion scheme
CyberScoop · Apr 21 · Relevance: ███████░░░ 7/10
Why it matters to CISOs: This insider threat case—where a ransomware negotiator colluded with BlackCat to maximize ransoms totaling $75.3M—is a direct warning to CISOs about vetting and segregating duties within incident response vendors and internal IR processes.
- Angelo Martino pleaded guilty to helping BlackCat extort $75.3 million from five victim companies
- Martino was employed as a legitimate ransomware negotiator at DigitalMint
- Case underscores the risk of the negotiator being involved in any part of the ransom payment process
🚀 Startup Ecosystem
Airbus Acquires Quarkslab to Counter AI Reverse Engineering
BankInfoSecurity · Apr 22 · Relevance: ██████░░░░ 6/10
Why it matters to CISOs: Airbus acquiring a cybersecurity firm specifically to counter AI-driven reverse engineering of aerospace systems signals growing concern about AI-powered attacks on embedded and edge systems—relevant for CISOs in defense, manufacturing, and critical infrastructure.
- Airbus plans to acquire 100-person French cybersecurity vendor Quarkslab
- Focus on protecting aerospace and defense software from AI-driven reverse engineering
- Part of broader European sovereign cybersecurity investment trend
Further Reading
- 🌍 UK cyber agency handling four major incidents a week as nation-state attacks surge — The Record (Recorded Future)
- 🌍 Pentagon Cyber Leaders Back $1.5T Budget Request — BankInfoSecurity
- 📡 Mozilla: Anthropic's Mythos found 271 security vulnerabilities in Firefox 150 — Ars Technica Security
- 📡 Three AI coding agents leaked secrets through a single prompt injection. One vendor's system card predicted it — VentureBeat Security
- 🔓 Vercel breach exposes the OAuth gap most security teams cannot detect, scope or contain — VentureBeat Security
- 🔓 CISA urges security teams to view environments following axios compromise — Cybersecurity Dive
- ⚖️ Lawmakers ponder terrorism designations, homicide charges over hospital ransomware attacks — CyberScoop
- ⚖️ Former DigitalMint ransomware negotiator pleads guilty to extortion scheme — CyberScoop
- 🚀 Airbus Acquires Quarkslab to Counter AI Reverse Engineering — BankInfoSecurity
Full Transcript
Click to expand full episode transcript
Jordan: An AI model just found 271 zero-day vulnerabilities in Firefox. In one pass. That same class of model is available to every nation-state, every ransomware crew, and every threat actor with a cloud account. If that doesn't reframe your patching strategy conversation with the board, I don't know what will.
Alex: Welcome to Cleartext. It's Wednesday, April 22nd, 2026. I'm Alex Chen.
Jordan: And I'm Jordan Reeves.
Alex: Today we're covering a lot of ground—and most of it points in the same direction. Nation-state tempo is up. AI is reshaping both the offense and the defense. And the software supply chain is having a genuinely bad week. We've got the UK's NCSC sounding alarms at a volume we haven't heard before, two significant supply chain compromises demanding your team's attention right now, a Vercel breach that every CISO with SaaS sprawl should read carefully, and some legislative movement on ransomware that could change the legal calculus overnight. Let's get into it.
Jordan: Start with the UK, because the numbers are striking. The NCSC disclosed this week that they're handling four nationally significant cyber incidents every week. Not incidents broadly—nationally significant ones. And the majority are now attributed to hostile foreign governments, not criminal actors. Their framing is explicit: converging geopolitical tensions plus accelerating technology equals a perfect storm. That's not bureaucratic hedging. That's a warning.
Alex: And the relevance for CISOs outside the UK isn't abstract. What the NCSC is seeing in terms of nation-state tempo and targeting patterns reflects a global shift. When a G7 intelligence agency says the majority of major incidents are state-sponsored, that should land differently in your board risk presentation than the generic "threat landscape is evolving" language we've been using for years. If your board still thinks of nation-states as someone else's problem, these numbers should end that conversation.
Jordan: Reinforcing that, the Pentagon this week told Congress that the new 1.5 trillion dollar budget request positions cyber as a core warfighting domain. The funding covers expanded offensive operations, AI-driven capabilities, and a significant Cyber Command overhaul. The specific framing from defense officials was that adversaries have shifted from espionage to pre-positioned disruptive attacks. That's a meaningful distinction. Espionage steals data. Pre-positioning means they're already inside systems they intend to disrupt at a time of their choosing.
Alex: Two implications for CISOs. First, if you operate in or adjacent to the defense industrial base, compliance requirements are going to tighten, and probably faster than the acquisition cycle can accommodate. Start that conversation with your legal and regulatory teams now. Second, more broadly—when the US is expanding offensive cyber operations and adversaries are responding in kind, the volume and sophistication of activity across the entire internet goes up. The contested environment doesn't stay contained to government networks.
Jordan: Now let's talk about AI and vulnerability discovery, because this is the story I'd be thinking about if I were sitting in a CISO chair today. Anthropic's Mythos model found 271 security vulnerabilities in Firefox 150. Mozilla's own CTO described the model as, quote, every bit as capable as the world's best security researchers. That's not marketing copy—that's the vendor whose product was analyzed saying the AI matched their best humans.
Alex: Here's the strategic problem. This capability isn't proprietary to Anthropic or to defenders. The same class of model, and in some cases the same models, are accessible to well-resourced threat actors. What this does to your patch window assumptions is severe. We've operated on a mental model where there's some lag between a vulnerability existing and an exploit appearing in the wild. That lag is shrinking toward zero for any organization that isn't patching aggressively. This is a conversation to have with your board framed around mean time to patch, not around whether AI is interesting.
Jordan: And the AI risk this week wasn't limited to vulnerability discovery. Researchers at Johns Hopkins demonstrated what they're calling Comment and Control—a prompt injection attack where a malicious instruction embedded in a GitHub pull request title caused Claude Code, Gemini CLI, and GitHub Copilot Agent to each post their own API keys as PR comments. No external infrastructure required. Three separate AI coding agents from three separate vendors, all vulnerable to the same technique.
Alex: This is a live attack surface. If your development teams are using AI agents in CI/CD pipelines—and most of them are at this point—you need to treat those integrations as privileged processes with the same scrutiny you'd apply to any other automated system with production access. The specific vector here involves the pull_request_target trigger, which exposes secrets to fork PRs. That's an immediate configuration audit item. But the broader takeaway is that AI agents are not just productivity tools. They're new attack surface, and most security teams are not yet governing them as such.
Jordan: Staying on supply chain, two significant incidents this week. The Vercel breach is instructive because it's a perfect illustration of how shadow AI creates exposure. One Vercel employee adopted a third-party AI tool. That tool's vendor got hit with an infostealer. The attacker walked through an OAuth grant that nobody had reviewed into Vercel's production environment. Mandiant is engaged, law enforcement notified. The good news is that no npm packages were compromised—that was verified jointly with GitHub, Microsoft, and Socket.
Alex: But the mechanism here is the story. OAuth grants from employee-adopted AI tools are the new shadow IT. Most security teams have reasonable visibility into sanctioned SaaS. They have almost no visibility into the OAuth grants their employees are generating by connecting AI tools to their work accounts. An audit of OAuth grants in your environment—specifically third-party AI tool integrations with access to production systems—is not optional at this point. This is where the breach surface is growing fastest.
Jordan: The second supply chain hit is more urgent in terms of immediate action. CISA issued guidance this week following a compromise of the axios JavaScript library, which has hundreds of millions of weekly downloads. Attribution points to a North Korea-linked actor. CISA's direction is straightforward: review your environments now for indicators of compromise. If axios is in your dependency tree—and the odds are high that it is—this goes to your security team today.
Alex: Now, a story with significant long-term implications, particularly for anyone in healthcare or with healthcare clients. The House Homeland Security Committee held a hearing this week that included serious discussion of terrorism designations for ransomware groups that target hospitals, and homicide charges for attacks that result in patient deaths. A former FBI official endorsed the terrorism classification. This isn't fringe positioning—it's gaining real traction.
Jordan: The legal consequences if this moves forward are substantial. Terrorism designations trigger sanctions frameworks. Ransom payments to designated groups become federal crimes. Insurance coverage under existing cyber policies could become void if paying is legally prohibited. Healthcare CISOs and their general counsel need to be tracking this actively and starting scenario planning now, not when legislation passes.
Alex: And one more governance story worth flagging quickly. A former ransomware negotiator at DigitalMint pleaded guilty this week to colluding with BlackCat to maximize ransoms totaling 75 million dollars across five victim companies. He was the person hired to negotiate on the victim's behalf. The takeaway for CISOs is direct: the IR vendor ecosystem is not uniformly trustworthy. When you're vetting incident response and negotiation partners, you need the same due diligence rigor you'd apply to any third party with privileged access—references, conflict-of-interest disclosures, segregation of duties between negotiation and payment facilitation.
Jordan: One brief item before we close. Airbus is acquiring Quarkslab, a French cybersecurity firm focused on protecting aerospace and defense systems from AI-driven reverse engineering. It's a 100-person shop, but the acquisition rationale matters. Airbus is specifically worried about AI being used to reverse engineer embedded and edge systems in aircraft. For CISOs in defense, manufacturing, and critical infrastructure—this signals where the threat is heading on the OT and embedded systems side.
Alex: So what's the through-line this week? Jordan, I keep coming back to the same thing. The AI acceleration on both sides of this conflict is compressing every timeline we've built our security programs around.
Jordan: That's exactly right. Four major incidents a week in the UK. An AI model matching elite human researchers on vulnerability discovery. Prompt injection taking down three AI coding agents simultaneously. These aren't isolated data points. The threat environment is operating at a tempo that was theoretical two years ago and is operational now. The question for CISOs is whether your risk model has updated to reflect that, or whether you're still presenting to the board using last cycle's assumptions.
Alex: The practical near-term actions from today: audit your OAuth grants with focus on AI tool integrations, check your axios dependency exposure against CISA's guidance, review your CI/CD pipeline permissions for AI agent access, and update your patch window assumptions in light of what autonomous vulnerability discovery means for exploit timelines. And if you're in healthcare, get your legal team reading the terrorism designation language now.
Jordan: All of today's source links are in the show notes.
Alex: Thanks for listening to Cleartext. We're back tomorrow.
Cleartext is an automated daily podcast for CISOs and security leaders. Generated 2026-04-22.
Sources are pulled from: CyberScoop, The Record, SecurityWeek, Krebs on Security, Dark Reading, Cybersecurity Dive, BleepingComputer, Wired, Ars Technica, TechCrunch, Help Net Security, VentureBeat, Risky Business News, The Hacker News, CISA, and BankInfoSecurity.