<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: BeyondMachines</title>
    <description>The latest articles on DEV Community by BeyondMachines (@beyondmachines).</description>
    <link>https://dev.to/beyondmachines</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F11918%2F48c4d1b8-9bad-45fc-9717-af1f9d280297.png</url>
      <title>DEV Community: BeyondMachines</title>
      <link>https://dev.to/beyondmachines</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/beyondmachines"/>
    <language>en</language>
    <item>
      <title>State of (in)security - Week 16, 2026</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Mon, 20 Apr 2026 18:01:10 +0000</pubDate>
      <link>https://dev.to/beyondmachines/state-of-insecurity-week-16-2026-n65</link>
      <guid>https://dev.to/beyondmachines/state-of-insecurity-week-16-2026-n65</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Week 16 of 2026 saw 17 advisories and 22 incidents, with 16.7 million individuals impacted, driven largely by the McGraw-Hill Salesforce misconfiguration breach (13.5M) alongside major ransomware, phishing, and third-party compromises affecting healthcare, finance, and tech sectors. Key vulnerabilities included actively exploited zero-days in Microsoft products, critical flaws in Cisco, Fortinet, SAP, and Adobe, and a systemic RCE risk in the MCP protocol.&lt;/p&gt;

&lt;h3&gt;
  
  
  Take Action:
&lt;/h3&gt;

&lt;p&gt;This week third party libraries and AI are the focus:  If you're using Claude Code, update immediately to the latest version and stop using authentication helpers. Instead, set the ANTHROPIC_API_KEY environment variable directly. If you use Axios in your applications, start planning an update to version 1.15.0 or later.  Make sure your nginx-ui instances are isolated from the internet and accessible from trusted networks only.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/state-of-in-security-week-16-2026-q-8-4-u-9/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Kairos Ransomware Group Claims 441GB Data Theft from Strata Republic</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Mon, 20 Apr 2026 16:01:11 +0000</pubDate>
      <link>https://dev.to/beyondmachines/kairos-ransomware-group-claims-441gb-data-theft-from-strata-republic-38pe</link>
      <guid>https://dev.to/beyondmachines/kairos-ransomware-group-claims-441gb-data-theft-from-strata-republic-38pe</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;The Kairos ransomware group claims to have stolen 441 GB of sensitive data from Australian strata management firm Strata Republic, including tax file numbers and employee IDs. The threat actor has threatened to leak the full dataset following the company's silence regarding the breach.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/kairos-ransomware-group-claims-441gb-data-theft-from-strata-republic-c-7-s-t-5/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Dell Patches Root-Level Vulnerabilities in PowerProtect Data Domain</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Mon, 20 Apr 2026 15:01:10 +0000</pubDate>
      <link>https://dev.to/beyondmachines/dell-patches-root-level-vulnerabilities-in-powerprotect-data-domain-3bmi</link>
      <guid>https://dev.to/beyondmachines/dell-patches-root-level-vulnerabilities-in-powerprotect-data-domain-3bmi</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Dell patched over 15 vulnerabilities in PowerProtect Data Domain, including a critical SQLite flaw and multiple root-level vulnerabilities that allow remote code execution and full system compromise.&lt;/p&gt;

&lt;h3&gt;
  
  
  Take Action:
&lt;/h3&gt;

&lt;p&gt;Make sure your Dell PowerProtect Data Domain appliances are isolated from the internet and accessible only from trusted management networks. Then plan a quick update DD OS to version 7.13.1.70, 8.3.1.30, 8.6.1.10, 8.7.0.1, or later (depending on your branch) via the Data Domain Download portal.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/dell-patches-root-level-vulnerabilities-in-powerprotect-data-domain-4-w-l-m-m/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Maryland Real Property Search Tool Taken Offline Following Suspicious Activity</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Mon, 20 Apr 2026 09:01:09 +0000</pubDate>
      <link>https://dev.to/beyondmachines/maryland-real-property-search-tool-taken-offline-following-suspicious-activity-1m27</link>
      <guid>https://dev.to/beyondmachines/maryland-real-property-search-tool-taken-offline-following-suspicious-activity-1m27</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Maryland state officials took the Real Property Search tool offline on April 14, 2026, after detecting suspicious activity on servers hosting the Department of Assessments and Taxation application. The incident has disrupted real estate transactions and prompted warnings against using unofficial third-party data sources.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/maryland-real-property-search-tool-taken-offline-following-suspicious-activity-m-y-v-u-h/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Vercel Discloses Internal System Breach Following Third-Party OAuth Compromise</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Mon, 20 Apr 2026 08:01:11 +0000</pubDate>
      <link>https://dev.to/beyondmachines/vercel-discloses-internal-system-breach-following-third-party-oauth-compromise-1n27</link>
      <guid>https://dev.to/beyondmachines/vercel-discloses-internal-system-breach-following-third-party-oauth-compromise-1n27</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Vercel suffered a data breach after a third-party AI tool's Google Workspace OAuth app was compromised, allowing attackers to access internal systems and allegedly exfiltrate employee data, source code, and API keys.&lt;/p&gt;

&lt;h3&gt;
  
  
  Take Action:
&lt;/h3&gt;

&lt;p&gt;If you're a Vercel customer, reach out to Vercel immediately. Immediately check your Google Admin Console (&lt;a href="https://admin.google.com/ac/owl/list?tab=apps" rel="noopener noreferrer"&gt;https://admin.google.com/ac/owl/list?tab=apps&lt;/a&gt;) filtering by app ID 110671459871-30f1spbu0hptbs60cb4vsmv79i7bbvqj.apps.googleusercontent.com: if it appears, revoke access and rotate all exposed secrets (NPM/GitHub tokens, API keys, deployment credentials). Finally, audit your Vercel deployments and Linear workspace for suspicious activity.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/vercel-discloses-internal-system-breach-following-third-party-oauth-compromise-f-5-a-0-x/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Amtrak Customer Data Leaked Following Salesforce Environment Compromise</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sun, 19 Apr 2026 16:01:10 +0000</pubDate>
      <link>https://dev.to/beyondmachines/amtrak-customer-data-leaked-following-salesforce-environment-compromise-2n0h</link>
      <guid>https://dev.to/beyondmachines/amtrak-customer-data-leaked-following-salesforce-environment-compromise-2n0h</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Amtrak's customer data, including 2.1 million unique emails and support ticket details, was leaked by the ShinyHunters group after a social engineering attack compromised the company's Salesforce environment.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/amtrak-customer-data-leaked-following-salesforce-environment-compromise-9-9-c-l-0/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Ameriprise Financial Reports Data Breach Affecting Over 47,000 Customers</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sun, 19 Apr 2026 15:01:09 +0000</pubDate>
      <link>https://dev.to/beyondmachines/ameriprise-financial-reports-data-breach-affecting-over-47000-customers-3122</link>
      <guid>https://dev.to/beyondmachines/ameriprise-financial-reports-data-breach-affecting-over-47000-customers-3122</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Ameriprise Financial Inc. disclosed a data breach affecting 47,876 individuals after an unauthorized person accessed stored files in March 2026, exposing Social Security numbers and financial account details.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/ameriprise-financial-reports-data-breach-affecting-over-47000-customers-l-1-d-y-h/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Hotel Curracloe Guests Targeted in Phishing Campaign Following GuestDiary Data Breach</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sun, 19 Apr 2026 14:01:09 +0000</pubDate>
      <link>https://dev.to/beyondmachines/hotel-curracloe-guests-targeted-in-phishing-campaign-following-guestdiary-data-breach-489a</link>
      <guid>https://dev.to/beyondmachines/hotel-curracloe-guests-targeted-in-phishing-campaign-following-guestdiary-data-breach-489a</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Hotel Curracloe in Ireland reported a third-party data breach at its booking provider, GuestDiary.com, which led to targeted phishing attacks against guests via WhatsApp and email.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/hotel-curracloe-guests-targeted-in-phishing-campaign-following-guestdiary-data-breach-n-3-l-p-c/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Aligned Orthopedic Partners Discloses Email Environment Data Breach</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sun, 19 Apr 2026 13:01:10 +0000</pubDate>
      <link>https://dev.to/beyondmachines/aligned-orthopedic-partners-discloses-email-environment-data-breach-370p</link>
      <guid>https://dev.to/beyondmachines/aligned-orthopedic-partners-discloses-email-environment-data-breach-370p</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Aligned Orthopedic Partners reports a data breach involving unauthorized access to its email environment between November and December 2025, potentially exposing sensitive personal and protected health information.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/aligned-orthopedic-partners-discloses-email-environment-data-breach-t-9-q-v-h/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Impac Mortgage Holdings Reports Two-Year-Old Data Breach Affecting Over 19,000 Individuals</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sun, 19 Apr 2026 12:01:11 +0000</pubDate>
      <link>https://dev.to/beyondmachines/impac-mortgage-holdings-reports-two-year-old-data-breach-affecting-over-19000-individuals-3hg7</link>
      <guid>https://dev.to/beyondmachines/impac-mortgage-holdings-reports-two-year-old-data-breach-affecting-over-19000-individuals-3hg7</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Impac Mortgage Holdings disclosed a data breach that exposed the Social Security numbers of 19,253 individuals after an unknown actor accessed its systems in early 2024. The company waited two years after discovery to notify the public and is now offering credit monitoring services.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/impac-mortgage-holdings-reports-two-year-old-data-breach-affecting-over-19000-individuals-u-v-h-c-a/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Inditex Reports Data Breach via Former Third-Party Technology Provider</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sun, 19 Apr 2026 11:01:11 +0000</pubDate>
      <link>https://dev.to/beyondmachines/inditex-reports-data-breach-via-former-third-party-technology-provider-51n4</link>
      <guid>https://dev.to/beyondmachines/inditex-reports-data-breach-via-former-third-party-technology-provider-51n4</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Inditex, the parent company of Zara, reports a data breach involving unauthorized access to customer transaction databases hosted by a former third-party technology provider. Commercial interaction records were exposed, but Inditex claims that sensitive personal data, passwords, and financial information are secure.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/inditex-reports-data-breach-via-former-third-party-technology-provider-x-n-x-p-v/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Critical Remote Code Execution Vulnerability Discovered in Protobuf.js Library</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sun, 19 Apr 2026 10:01:10 +0000</pubDate>
      <link>https://dev.to/beyondmachines/critical-remote-code-execution-vulnerability-discovered-in-protobufjs-library-gm</link>
      <guid>https://dev.to/beyondmachines/critical-remote-code-execution-vulnerability-discovered-in-protobufjs-library-gm</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Protobuf.js patched a critical remote code execution vulnerability (CVE-2026-41242) caused by unsafe dynamic code generation when processing malicious protobuf schemas. The flaw allows attackers to execute arbitrary JavaScript code on servers or developer machines, potentially exposing sensitive credentials and enabling lateral movement.&lt;/p&gt;

&lt;h3&gt;
  
  
  Take Action:
&lt;/h3&gt;

&lt;p&gt;If your applications use protobuf.js (or libraries like gRPC, Firebase, or Google Cloud SDKs), update protobuf.js to version 8.0.1 or 7.5.5 ASAP. Run npm audit to catch hidden dependencies. Going forward, only load schemas you control and prefer precompiled static schemas in production to avoid this class of attack entirely.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/critical-remote-code-execution-vulnerability-discovered-in-protobuf-js-library-o-k-k-y-h/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
  </channel>
</rss>
