<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Posts on Cyber Intel Hub</title><link>https://www.secintel.net/posts/</link><description>Recent content in Posts on Cyber Intel Hub</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Tue, 07 Apr 2026 23:55:20 +0000</lastBuildDate><atom:link href="https://www.secintel.net/posts/index.xml" rel="self" type="application/rss+xml"/><item><title>Cyber Intel Brief: April 07, 2026</title><link>https://www.secintel.net/posts/2026-04-07/</link><pubDate>Tue, 07 Apr 2026 23:55:20 +0000</pubDate><guid>https://www.secintel.net/posts/2026-04-07/</guid><description>&lt;p&gt;&lt;strong&gt;Daily Cyber Intelligence Brief&lt;/strong&gt;
&lt;strong&gt;Date:&lt;/strong&gt; April 6, 2026
&lt;strong&gt;Report Prepared by:&lt;/strong&gt; Senior Cyber Security Researcher&lt;/p&gt;
&lt;h3 id="1-main-headline-russian-state-actors-weaponize-18000-soho-routers-to-exfiltrate-microsoft-office-tokens"&gt;1. Main Headline: Russian State Actors Weaponize 18,000+ SOHO Routers to Exfiltrate Microsoft Office Tokens&lt;/h3&gt;
&lt;hr&gt;
&lt;h3 id="2-the-big-story-apt28s-global-dns-hijacking-campaign"&gt;2. The Big Story: APT28’s Global DNS Hijacking Campaign&lt;/h3&gt;
&lt;p&gt;The Russia-linked threat actor APT28 (also known as Forest Blizzard) has launched a massive exploitation campaign targeting insecure Small Office/Home Office (SOHO) routers, specifically MikroTik and TP-Link devices. By exploiting known vulnerabilities and poor credential hygiene in these edge devices, the group has compromised over 18,000 networks to create a sprawling, resilient infrastructure for cyber espionage.&lt;/p&gt;</description></item></channel></rss>