Cybersecurity Roundup: April 2026 | Kocho
Skip to content
Funnel overlay image

Cybersecurity Roundup April 2026

arrow icon arrow icon

From Kocho’s Security Operations Centre (SOC)

Published: 06 May 2026

April’s incidents included a major cPanel takeover flaw that exposed millions of websites, OAuth token theft via third‑party AI tools, DNS hijacking of Microsoft 365 logins, an actively exploited SharePoint zero‑day and IT helpdesk impersonation attacks.

The headlines:

  • Critical cPanel flaw leaves millions of websites exposed
  • Vercel breached after OAuth tokens stolen via third‑party AI tool
  • NCSC warns of large-scale credential theft via router DNS hijacking
  • Microsoft fixes actively exploited SharePoint zero‑day
  • Attackers impersonate IT helpdesks through Microsoft Teams

Read more about these key threats and recommended actions identified by our SOC team this month:

Actively exploited cPanel vulnerability exposes millions of websites to takeover

Security researchers disclosed a critical authentication bypass vulnerability in cPanel and WebHost Manager (WHM), widely used web server management software that underpins over a million websites globally. The flaw allows attackers to gain administrative access to the cPanel interface without valid credentials, potentially enabling full server and website takeover.

The vulnerability, tracked as CVE-2026-41940, has been added to CISA’s Known Exploited Vulnerabilities catalogue, confirming active exploitation in the wild. All supported cPanel versions after 11.40 are affected, including DNSOnly and WP Squared deployments.

In response, cPanel released patches on 28 April 2026. Several major hosting providers temporarily blocked access to cPanel interfaces while patching, citing evidence of exploitation attempts dating back to February 2026.

What are the risks?

  • Authentication bypass enables full administrative takeover
  • A single compromised server can expose hundreds or thousands of hosted sites
  • Shared hosting environments amplify blast radius across unrelated organisations

Recommended actions:

Apply cPanel and WHM patches immediately across all environments.

Ebony and green hands warning icon on transparent background

Restrict access to management interfaces using IP allow lists where possible.

Monitor for unauthorised administrative access and configuration changes.

Green and ebony thumbs up icon on transparent background

Confirm hosting providers have completed patching and incident reviews.

Vercel breach tied to OAuth token theft via third-party AI tool

Vercel confirmed a breach after a company employee used the third-party AI analytics tool Context.ai. Attackers stole OAuth tokens from the tool and used them to access the employee’s Google Workspace account. From there, they moved laterally into internal systems. Vercel stated that a subset of customer credentials was exposed during the incident.

The case highlights how OAuth token abuse can bypass traditional authentication controls and how third-party AI tooling introduces new trust and data exposure risks.

What are the risks?

  • OAuth tokens can grant broad access without requiring a password or MFA reauthentication
  • Third-party SaaS and AI tools expand the identity attack surface
  • Compromised employee identities can enable downstream access to customer systems and data

Recommended actions:

Ebony and green alert search magnifying glass icon on transparent background

Audit and restrict third-party OAuth app access across Google Workspace and Microsoft 365.

Ebony and green gavel and tick icon on transparent background

Enforce conditional access and token protection policies.

Monitor for anomalous OAuth consent and token use.

Review AI and SaaS tooling approval and data access processes.

NCSC warns of large-scale credential theft via router DNS hijacking

The UK National Cyber Security Centre has warned that Russian state-aligned threat actors, tracked as APT28, are hijacking DNS settings on vulnerable routers. By manipulating DNS resolution, attackers redirect users to adversary-in-the-middle infrastructure that intercepts web and email logins, particularly for Outlook, Office and Microsoft 365 services.

The campaign enables theft of credentials and OAuth tokens without deploying malware on victim devices.

What are the risks?

  • Credentials and tokens can be stolen even on fully patched endpoints
  • Home and small office routers present a weak link for remote workers
  • Intercepted authentication flows undermine Zero Trust assumptions

Recommended actions:

Ebony and green tickets on transparent background

Patch and replace unsupported network routers.

Ebony fingerprint icon on transparent background

Enforce phishing-resistant MFA and token binding where possible.

Monitor for abnormal sign-in locations and token use.

Ebony and green person presenting icon on transparent background

Educate users to report certificate warnings and unusual login behaviour.

Microsoft patches actively exploited SharePoint zero-day (CVE-2026-32201)

Microsoft released security fixes for CVE-2026-32201, an actively exploited SharePoint vulnerability that allows spoofing and unauthorised data access. The flaw was addressed during April 2026 Patch Tuesday alongside more than 160 additional vulnerabilities.

Researchers confirmed exploitation in the wild prior to patch availability.

What are the risks?

  • Unpatched SharePoint servers can expose sensitive data
  • Spoofing flaws undermine trust in internal collaboration platforms
  • Internet-facing collaboration tools remain high-value targets

Recommended actions:

Ebony and green file padlock icon on transparent background

Apply SharePoint security updates immediately.

Ebony and green alert warning icon on transparent background

Restrict external access to SharePoint where possible.

Ebony and green ticklist icon on transparent background

Review logs for signs of exploitation prior to patching.

UNC6692 impersonates IT helpdesk staff via Microsoft Teams

Threat actors tracked as UNC6692 combined email bombing techniques with Microsoft Teams impersonation. After overwhelming users with spam, attackers posed as IT support staff offering help through Teams. Victims were directed to a fake page where they were prompted to enter credentials.

The campaign relies entirely on social engineering and trusted collaboration tools.

What are the risks?

  • Teams and similar platforms are implicitly trusted by users
  • Email bombing increases urgency and reduces user vigilance
  • Credential harvesting enables follow-on identity-based attacks

Recommended actions:

Ebony and green people connected icon on transparent background

Train users to verify unsolicited IT support requests.

Ebony and green padlock cloud icon on transparent background

Restrict external Teams communications where not required.

Ebony and green speedometer icon on transparent background

Monitor for abnormal Teams activity following email floods.

tag icon

From our blog

Tenant sprawl: The hidden risk undermining business resilience

As organisations accelerate cloud adoption, many are unknowingly creating sprawl across Microsoft 365 and Azure tenants.

Technology Evangelist, David Guest, explores how unmanaged tenant growth increases identity risk, complicates security operations and undermines resilience during incidents and acquisitions.

tag icon

Get cyber confident

Real partnership. Microsoft expertise. Complete transparency.

Request a call back today.

  • AI-powered rapid protection, from day one
  • Dedicated Microsoft experts, by your side
  • Powerful, intuitive reporting tools
  • Collaboration and transparency as standard

Butterfly overlay image

Got a question? Need more information?

Our expert team is here to help.