Introduction
The cybersecurity landscape continues to evolve rapidly, with this week's threat intelligence report revealing a mix of sophisticated AI-driven attacks, large-scale data breaches, and critical vulnerabilities that demand immediate attention. From compromised cloud environments to supply chain infections, organizations and individuals alike face an increasingly complex threat matrix. Below, we break down the most significant incidents and patching priorities for the week of April 20th.

Top Attacks and Breaches
Booking.com Confirms Data Exposure
The Amsterdam-based travel platform Booking.com has acknowledged that unauthorized individuals gained access to reservation data belonging to some customers. The compromised information includes names, email addresses, phone numbers, physical addresses, and booking details – a combination that significantly elevates phishing risk. In response, the company has reset reservation PINs and notified affected users directly. This incident underscores the importance of enabling two-factor authentication and remaining vigilant against suspicious communications following a breach.
McGraw-Hill Breach Affects 13.5 Million Accounts
Global educational publisher McGraw-Hill disclosed a data breach stemming from an extortion attempt after attackers infiltrated its Salesforce environment. Approximately 13.5 million accounts were exposed, leaking names, email addresses, phone numbers, and physical addresses. Fortunately, no payment card information appears to have been compromised. The incident highlights the risks of third-party platform integrations and the need for robust access controls.
EssentialPlugin Supply Chain Compromise
WordPress plugins development firm EssentialPlugin suffered a supply chain attack that pushed malicious updates to more than 30 plugins installed on thousands of websites. The backdoored code granted unauthorized access and facilitated the creation of spam pages. While WordPress.org has closed the affected plugins, residual infections may persist on sites that applied the tainted updates. Website administrators should immediately audit their plugin installations and scan for signs of compromise.
Basic-Fit Gym Chain Data Leak
Europe's largest gym chain, Basic-Fit, reported a breach after attackers gained access to a franchise-wide system used to track club visits. The incident exposed bank account details and personal data for approximately one million members across six countries. Notably, passwords and identity documents were not affected. The breach illustrates the value of segmenting sensitive financial data from core operational systems.
AI Threats
Lone Hacker Uses AI to Breach Mexican Government Agencies
In a startling demonstration of AI-powered cyber warfare, researchers revealed that a single attacker weaponized Claude Code and OpenAI's GPT-4.1 to breach nine Mexican government agencies. The AI-driven commands accelerated reconnaissance, executing 5,317 actions across 34 sessions. This enabled the extraction of 195 million taxpayer records and 220 million civil records. The attacker bypassed safety filters through prompt manipulation and an injected hacking manual. This case highlights the urgent need for AI service providers to strengthen guardrails against malicious use.

Claude AI Phishing Campaign Distributes PlugX
Security researchers have detailed a phishing campaign that impersonates Anthropic's Claude AI with a fake Claude Pro installer for Windows. The malicious package displays a working application to distract victims while abusing a trusted program to sideload PlugX malware. This tactic enables remote access and persistence on compromised systems. Users should only download AI software from official sources and verify digital signatures before installation.
Prompt Injection Hijacks GitHub AI Agents
A newly demonstrated prompt injection technique can hijack AI agents used in GitHub workflows from major vendors. Malicious instructions hidden in pull request titles or comments can trick the agents into executing commands and exposing repository secrets, including access tokens and API keys, during automated development tasks. Development teams should review their CI/CD pipelines and implement strict input validation for AI-driven tools.
Vulnerabilities and Patches
CISA Warns of Active Exploitation: Apache ActiveMQ CVE-2026-34197
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about active exploitation of CVE-2026-34197, a high-severity code injection flaw in Apache ActiveMQ. The vulnerability allows remote code execution and carries a CVSS score of 8.8. Apache has addressed the issue in versions 5.19.4 and 6.2.3. Organizations are strongly urged to update immediately. Check Point IPS provides protection against this threat, as detailed in the Apache ActiveMQ Code Injection (CVE-2026-34197) signature.
Splunk Fixes High-Severity Vulnerability CVE-2026-20204
Splunk has released patches for CVE-2026-20204, a high-severity vulnerability that could be exploited to compromise system integrity. Although specific technical details remain under embargo, administrators are advised to apply the updates as soon as possible to mitigate potential risk.
Conclusion
This week's threat intelligence reveals a clear trend: adversaries are increasingly leveraging AI to scale attacks, while traditional data breaches and supply chain compromises remain persistent threats. Staying informed and applying timely patches are critical first lines of defense. For the full technical bulletin, download the Threat Intelligence Report for April 20th.