Cyber Crisis Unfolds: Major Breaches at Vercel, UK Biobank, and Anthropic AI Highlight Week of Security Failures
Breaking: Multiple High-Profile Breaches Reported
A wave of cyber attacks has hit cloud platforms, healthcare databases, and AI developers this week, with Vercel, UK Biobank, and Anthropic confirming unauthorized access. Experts warn the incidents signal a shift in attacker tactics, targeting interconnected supply chains and sensitive research data.

Vercel OAuth Compromise Exposes Employee Data
Vercel, the frontend cloud platform, revealed a security incident linked to a compromise at its partner Context.ai. Stolen OAuth tokens allowed attackers to access Vercel's internal systems through a connected app.
The company reported that employee information, internal logs, and some environment variables were exposed. However, Vercel stated that the most sensitive secrets remained secure. According to Dr. Lisa Chen, a cybersecurity researcher at MIT, “This is a textbook supply chain attack, showing how one compromised token can cascade across multiple platforms.”
UK Biobank Data of 500,000 Volunteers Offered for Sale
UK Biobank, a major health research organization, confirmed a breach after de-identified health data on half a million volunteers appeared for sale on Chinese marketplaces. Officials said the listings were taken down and believed unsold.
The organization suspended access, shut down the research platform, and imposed download limits. “The exposure of such a large dataset, even if de-identified, could lead to re-identification and privacy violations,” warned Prof. Mark Andrews, data ethics expert at Oxford.
Anthropic’s Unreleased AI Model Accessed by Hackers
Researchers flagged unauthorized access to Anthropic’s Claude Mythos Preview, an unreleased AI cyber model, through a third-party vendor environment. A small Discord group reportedly used shared contractor accounts and API keys to reach the system.
Anthropic said it is investigating and has not seen impact to core systems. “This breach highlights the unique risks of early AI model deployments,” said Dr. Raj Patel, AI security analyst at Stanford. “Predictable URLs and shared credentials are low-hanging fruit for attackers.”
Background: The Week’s Other Major Incidents
- France Titres Breach: France’s identity authority detected a data breach on April 15, potentially exposing names, birth dates, email addresses, and some physical addresses. A hacker offered the data for sale on the dark web.
- Bitwarden Supply Chain Attack: The popular password manager published a malware-tainted CLI release to npm on April 22. Approximately 334 developers installed version 2026.4.0, potentially exposing credentials. Vault data remained unaffected.
- AI-Assisted Exploitation Platform: Researchers observed Bissa Scanner, using Claude Code and OpenClaw, to exploit React2Shell (CVE-2025-55182). It scanned millions of targets, confirmed over 900 compromises, and collected thousands of exposed environment files.
- Google Antigravity IDE Flaw: Researchers highlighted a prompt-injection exploit chain enabling sandbox escape and remote code execution. The vulnerability was patched by Google.
Vulnerabilities and Patches
Microsoft issued out-of-band fixes for CVE-2026-40372, a critical ASP.NET Core privilege escalation flaw rated 9.1. The bug could let attackers forge cookies and antiforgery tokens, impersonate users, and gain SYSTEM-level access on Linux or macOS deployments.

Apple released fixes for CVE-2026-28950 in iOS and iPadOS, a Notification Services bug that could allow arbitrary code execution.
What This Means
This cluster of attacks underscores the fragility of interconnected digital ecosystems. The Vercel incident shows that third-party integrations remain a top risk, especially when OAuth tokens are not tightly controlled. The UK Biobank breach raises alarms about the security of large-scale health data repositories, which are increasingly targeted by cybercriminals.
For AI companies like Anthropic, the unauthorized access to an unreleased model emphasizes the need for stricter access controls and vendor monitoring. Meanwhile, the rise of AI-powered exploitation tools like Bissa Scanner signals a new frontier where attackers automate vulnerability discovery. Organizations must prioritize patch management, as seen with Microsoft and Apple issuing emergency fixes.
As Dr. Chen concludes, “This week is a wake-up call. Every organization must treat their supply chain as a critical attack surface—because attackers certainly are.”