<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://spbavarva.github.io/0day.digest/</id><title>0day.digest</title><subtitle>0day.digest is a daily journal tracking AI launches, supply chain attacks, CVEs, breaches, and emerging threats — short signal items plus the occasional deep dive.</subtitle> <updated>2026-04-14T17:12:24-07:00</updated> <author> <name>Sneh Bavarva</name> <uri>https://spbavarva.github.io/0day.digest/</uri> </author><link rel="self" type="application/atom+xml" href="https://spbavarva.github.io/0day.digest/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://spbavarva.github.io/0day.digest/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 Sneh Bavarva </rights> <icon>/0day.digest/assets/img/favicons/favicon.ico</icon> <logo>/0day.digest/assets/img/favicons/favicon-96x96.png</logo> <entry><title>April 2026 Patch Tuesday: SharePoint Zero-Day Among 167 CVEs Fixed</title><link href="https://spbavarva.github.io/0day.digest/posts/april-2026-patch-tuesday-sharepoint-zero-day/" rel="alternate" type="text/html" title="April 2026 Patch Tuesday: SharePoint Zero-Day Among 167 CVEs Fixed" /><published>2026-04-14T14:47:59-07:00</published> <updated>2026-04-14T14:47:59-07:00</updated> <id>https://spbavarva.github.io/0day.digest/posts/april-2026-patch-tuesday-sharepoint-zero-day/</id> <content type="text/html" src="https://spbavarva.github.io/0day.digest/posts/april-2026-patch-tuesday-sharepoint-zero-day/" /> <author> <name>Sneh Bavarva</name> </author> <category term="Daily Signal" /> <summary>Microsoft released patches for 167 security vulnerabilities, making this the second-largest Patch Tuesday by CVE count on record. Two zero-days are included: CVE-2026-32201, a SharePoint Server improper input validation flaw that is under confirmed active exploitation (now added to CISA’s KEV catalog), and a publicly disclosed Windows Defender weakness called “BlueHammer.” Separately, Google C...</summary> </entry> <entry><title>OpenAI Launches GPT-5.4-Cyber, a Fine-Tuned Model for Defensive Security Use Cases</title><link href="https://spbavarva.github.io/0day.digest/posts/openai-gpt54-cyber-security-model/" rel="alternate" type="text/html" title="OpenAI Launches GPT-5.4-Cyber, a Fine-Tuned Model for Defensive Security Use Cases" /><published>2026-04-14T14:23:59-07:00</published> <updated>2026-04-14T14:23:59-07:00</updated> <id>https://spbavarva.github.io/0day.digest/posts/openai-gpt54-cyber-security-model/</id> <content type="text/html" src="https://spbavarva.github.io/0day.digest/posts/openai-gpt54-cyber-security-model/" /> <author> <name>Sneh Bavarva</name> </author> <category term="Daily Signal" /> <summary>OpenAI has released GPT-5.4-Cyber, a fine-tuned variant of GPT-5.4 specifically trained for defensive cybersecurity use cases. OpenAI describes the model as “cyber-permissive,” meaning it can engage with security tasks that standard models would decline. The release is paired with an expanded Trusted Access for Cyber program, which requires identity verification via a government-issued ID befo...</summary> </entry> <entry><title>100+ Malicious Chrome Extensions in Web Store Steal Google OAuth Tokens and Deploy Backdoors</title><link href="https://spbavarva.github.io/0day.digest/posts/malicious-chrome-extensions-oauth-token-theft/" rel="alternate" type="text/html" title="100+ Malicious Chrome Extensions in Web Store Steal Google OAuth Tokens and Deploy Backdoors" /><published>2026-04-14T13:33:00-07:00</published> <updated>2026-04-14T13:33:00-07:00</updated> <id>https://spbavarva.github.io/0day.digest/posts/malicious-chrome-extensions-oauth-token-theft/</id> <content type="text/html" src="https://spbavarva.github.io/0day.digest/posts/malicious-chrome-extensions-oauth-token-theft/" /> <author> <name>Sneh Bavarva</name> </author> <category term="Daily Signal" /> <summary>More than 100 malicious extensions in the official Chrome Web Store have been discovered actively stealing Google OAuth2 Bearer tokens, deploying backdoors, and conducting ad fraud. The extensions abuse broad permissions (cookies, storage, tabs) to silently exfiltrate authentication tokens, granting attackers persistent access to Google accounts without requiring a password. OAuth token theft ...</summary> </entry> <entry><title>Anthropic Co-Founder Confirms Briefing Trump Administration on Mythos Despite Active Lawsuit</title><link href="https://spbavarva.github.io/0day.digest/posts/anthropic-mythos-trump-administration-briefing/" rel="alternate" type="text/html" title="Anthropic Co-Founder Confirms Briefing Trump Administration on Mythos Despite Active Lawsuit" /><published>2026-04-14T11:09:12-07:00</published> <updated>2026-04-14T11:09:12-07:00</updated> <id>https://spbavarva.github.io/0day.digest/posts/anthropic-mythos-trump-administration-briefing/</id> <content type="text/html" src="https://spbavarva.github.io/0day.digest/posts/anthropic-mythos-trump-administration-briefing/" /> <author> <name>Sneh Bavarva</name> </author> <category term="Daily Signal" /> <summary>Anthropic co-founder Jack Clark confirmed at the Semafor World Economy summit that the company briefed the Trump administration on Claude Mythos Preview’s capabilities, even while Anthropic has an active lawsuit against the U.S. government. Clark explained the decision reflects Anthropic’s view that responsible AI development requires engaging government stakeholders regardless of adversarial c...</summary> </entry> <entry><title>ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers</title><link href="https://spbavarva.github.io/0day.digest/posts/showdoc-rce-cve-2025-0520-actively-exploited/" rel="alternate" type="text/html" title="ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers" /><published>2026-04-13T22:50:00-07:00</published> <updated>2026-04-13T22:50:00-07:00</updated> <id>https://spbavarva.github.io/0day.digest/posts/showdoc-rce-cve-2025-0520-actively-exploited/</id> <content type="text/html" src="https://spbavarva.github.io/0day.digest/posts/showdoc-rce-cve-2025-0520-actively-exploited/" /> <author> <name>Sneh Bavarva</name> </author> <category term="Daily Signal" /> <summary>CVE-2025-0520 (CNVD-2020-26585), a CVSS 9.4 unrestricted file upload vulnerability in ShowDoc, a document management and collaboration service widely used in China, is now under confirmed active exploitation in the wild. The flaw stems from improper validation of uploaded file types, allowing unauthenticated attackers to upload arbitrary files and achieve remote code execution on the server. S...</summary> </entry> </feed>
