Today's Cybersecurity Pulse
Microsoft releases record‑size Patch Tuesday for April
The April update cycle delivered 165 patches addressing roughly 340 unique CVEs, including two zero‑day flaws, one of which is already being exploited in the wild. Microsoft urges immediate deployment across all product families.
Also developing:
By the numbers: Artemis raises $70M Series A

Deepfakes Are a Threat to Age Assurance, and Injection Attack Detection Is the Answer
Yoti’s CEO Robin Tombs warned that deepfake‑generated media can undermine age‑assurance systems by exploiting post‑authentication injection attacks. Traditional liveness detection, while still essential, no longer blocks sophisticated AI‑crafted faces that are introduced after the initial login. Yoti proposes a multi‑layered “Tower of London” approach that authenticates the capture device and verifies the media source before trusting the image. The model aims to restore confidence in digital age verification as generative AI continues to blur the line between real and synthetic faces.

Europe Builds Its First “Kill-Switch Proof” Cloud Recovery Stack
At the European Data Summit, Cubbit, SUSE, Elemento Cloud and StorPool unveiled Europe’s first fully sovereign disaster‑recovery stack, designed to protect organisations from foreign‑vendor kill‑switches and other catastrophic events. The solution bundles storage, compute, orchestration and security components into a...
Enterprises Must Embed AI-Led Security, Resilience and Trust, as Cyber Strategies for 2026: KPMG
KPMG’s 2026 cybersecurity report calls on enterprises to treat security as a core business driver, integrating AI, geopolitics and regulation into every layer of their architecture. It stresses adaptive data governance, autonomous Security Operations Centers with human‑in‑the‑loop oversight, and centralized...
Why Cloud Security Failures Continue to Expose Data and People to Unnecessary Cyber Risks
Cloud security lapses continue to jeopardize critical data, especially for government agencies and their vendors. Recent incidents—including Conduent’s ransomware breach that exposed 25 million records and stole 8 TB, Snowflake’s credential‑theft affecting over 165 customers, Change Healthcare’s mis‑configured portal leaking 192.7 million health...
Claude's Regression Sparks Widespread Bugs and Security Risks
Think about all the orgs using Claude right now that have no idea how bad it has become over the past 4 weeks ago. No statement from Claude - but a total revert to where the model was a year...
Your Face Is Being Exploited for Fraud, Unaware
Your face is currently being used to rob people—and you don't even know it yet. 🛑🖼️
European Civil Servants Are Being Forced Off WhatsApp
European governments—including France, Germany, Poland, the Netherlands, Luxembourg and Belgium—are replacing WhatsApp and Signal with home‑grown, sovereign messaging platforms for officials. The European Commission intends to complete its own messenger migration by the end of 2026. The move reflects growing...
Netgear M7 eSIM Routes Traffic Through Israeli Provider
I finally had a chance to look at why I keep getting directed to a UK address on Netgear M7. I wanted to use my physical Verizon sim but even though Netgear is advertising it would be ready by the...
Curity Looks to Reinvent IAM with Runtime Authorization for AI Agents
Curity, a Swedish IAM vendor, launched Access Intelligence, a runtime authorization layer for AI agents. The solution extends its Identity Server with Token Intelligence, issuing purpose‑bound OAuth tokens for each agent action. Unlike static IAM, it grants permissions on‑the‑fly and...
AI Hacks Reveal Remote Shutdown Vulnerability in Microinverters
AI-enabled hacks expose remote shutdown risk in microinverters #energysky -- via pv magazine global: https://t.co/p4PdEDHSAO
NIST Launches Development of Trustworthy AI Profile for Critical Infrastructure
The U.S. National Institute of Standards and Technology has begun developing a Trustworthy AI in Critical Infrastructure profile, extending its AI Risk Management Framework to guide operators of power, water, transportation and other essential services. The effort, outlined in a...
Brennan Builds Solid Foundation for Onshore Cyber Security
Brennan, an Australian managed services provider, reported a roughly 20% uplift in services revenue after acquiring Canberra‑based cyber specialist CBR Cyber. The growth is driven by a surge in demand for onshore, sovereign security, highlighted by a 13% year‑on‑year rise...
Ethiack Study Finds 19% of UK Telecom Websites Expose Server Details, 37% Have SSL Gaps
Agentic AI pentesting firm Ethiack reported that 19% of UK telecoms' web servers disclose software type and version, while 37% of SSL certificates are invalid, expired or misconfigured. The findings underscore a systemic misconfiguration problem that could aid state‑sponsored hackers...
OpenAI Launches GPT‑5.4‑Cyber, a Defensive AI Model for Cybersecurity
OpenAI introduced GPT‑5.4‑Cyber, a new defensive AI model aimed at bolstering cybersecurity defenses. The model mirrors Anthropic's Claude Mythos in its “cyber‑permissive” design and will be restricted to security‑focused deployments, prompting mixed reactions about its originality.

Wireless Broadband Alliance Claims Wi-Fi Security on a Par with Cellular
The Wireless Broadband Alliance (WBA) released a new Wi‑Fi security framework that it says puts Wi‑Fi on equal footing with cellular networks in terms of security. The guidance consolidates standards such as WPA3, OpenRoaming (Passpoint) and RadSec, covering authentication, encryption,...

CoW Swap Domain Locked Due to Security Issue: CoW Swap
CoW Swap’s primary domain swap.cow.fi was locked on April 14 after a security incident, rendering the site inaccessible. The protocol quickly deployed a temporary UI at a new URL to maintain trading continuity. Users were warned to rely only on...
Apple’s Double Standard: Elon’s App vs Facebook Spyware
Like when Facebook violated Apple’s policy with its alleged spyware app feeding it data about kids usage of competitive apps, you have to ask whether Apple treated Elon’s app the same way as everyone else.
Central Government yet to Notify Selection Panels for Data Protection Board
The Indian government has still not formed the search‑cum‑selection committees needed to appoint a chairperson and four members to the Data Protection Board of India (DPBI), five months after the board’s statutory creation under the Digital Personal Data Protection (DPDP)...
April Patch Tuesday Roundup: Zero Day Vulnerabilities and Critical Bugs
Microsoft’s April Patch Tuesday delivered 167 fixes, including a actively‑exploited SharePoint Server zero‑day (CVE‑2026‑32201) and a critical Windows IKE remote‑code‑execution flaw (CVE‑2026‑33824) with a 9.8 CVSS score. Additional high‑risk bugs affect Active Directory (CVE‑2026‑33826), TCP/IP stack (CVE‑2026‑33827) and SAP Business...

A Data Removal Service Helped Me Reclaim My Privacy - See if You Need One, Too
Personal data is routinely harvested by thousands of data brokers and sold without consumer consent. Manual opt‑out requests are impractical, prompting the rise of paid data‑removal services such as PrivacyBee and DeleteMe. These platforms scan the web, submit takedown requests,...

OpenAI Expands Cybersecurity Program Before Deploying New Models
OpenAI announced on April 14 that it is expanding its Trusted Access for Cyber (TAC) program, scaling it to thousands of verified security professionals and hundreds of enterprise teams. The rollout adds new identity‑verification tiers and introduces GPT‑5.4‑Cyber, a cyber‑permissive...

Like Anthropic, OpenAI Will Share Latest Technology Only With Trusted Companies
OpenAI announced a limited rollout of GPT‑5.4‑Cyber, an AI model that scans software for security flaws. The initial phase will reach hundreds of trusted partners, with plans to expand to thousands in the coming weeks. The approach mirrors Anthropic’s recent...
Kids' Cybercrime Pathway Traced Back to Gaming
Pretty good overview of the pathway to cybercrime for kids and the genesis always coming back to gaming. Kinda feel like that Roblox statement really missed the point though (assuming they understood the context).
Cloudflare Launches Managed OAuth for Access, Making Internal Apps Agent‑Ready in One Click
Cloudflare announced an open‑beta feature called Managed OAuth for Access that enables any internal application protected by Cloudflare Access to be agent‑ready with a single click. The update adds OAuth 2.0 support, dynamic client registration and PKCE flows, removing a...

Patch Tuesday's a Monster: Thank AI?
Microsoft’s April Patch Tuesday delivered 247 patches covering 164 vulnerabilities, including eight critical flaws and two actively exploited zero‑days in SharePoint and Chromium. Security researcher Joe Desimone reported that all five of his local‑privilege‑escalation bugs were discovered using AI, highlighting...
Palo Alto Networks Finalizes $400 Million Koi Acquisition, Expands AI Endpoint Security
Palo Alto Networks has closed a $400 million deal to acquire Israeli cybersecurity startup Koi, bolstering its AI‑driven endpoint security portfolio. The acquisition integrates Koi’s control‑layer platform into Prisma AIRS and Cortex XDR, creating a new “Agentic Endpoint Security” category for CIOs planning...

Major Crypto Exchanges Including Coinbase and Binance Are Racing to Access Anthropic’s Mythos Model to Defend Against AI-Powered Attacks
Major crypto exchanges are scrambling to secure Anthropic’s new Mythos AI model to protect against AI‑driven attacks. Coinbase’s CSO confirmed close talks with Anthropic, while Binance is already testing Mythos alongside its own tools. Fireblocks reported that Claude Opus 4.6 exposed...
Amplify Care Offers AI Cybersecurity Training
Amplify Care has launched an "AI and Cybersecurity" course within its Shield Training program, aimed at Canadian physicians navigating AI‑driven clinical systems. The offering combines expert‑led instruction with up to 12.5 Mainpro+ continuing education credits, addressing a sector where 64%...
Adobe PDF Tools Hit by Critical CVSS 9.6 Zero‑Day Exploited Since Late 2025
Adobe disclosed a critical CVSS 9.6 zero‑day in Acrobat and Reader that has been weaponized in the wild since November 2025. The company released a priority‑1 patch on April 12, 2026 and warned enterprises to install it within 72 hours...

MSP 1337 | Cybersecurity Education & Security Guidance
In this brief episode, the hosts explore the intertwined nature of cybersecurity and compliance, emphasizing that both are part of an ongoing journey for organizations. They discuss core topics such as incident response, penetration testing, and the evolving tactics of...

Intent-Based Access Control(IBAC) for Coding Agents
Coding agents such as Claude Code, Gemini CLI, Cline, and OpenClaw are expanding beyond developer use into HR, marketing, security, and finance, exposing a hidden security gap. Traditional human‑centric access controls cannot reliably interpret natural‑language prompts issued to autonomous agents....

Evolving Cyber Risk Driven by User Credentials and Human Error
Marlink’s Cyber Intelligence Report for Remote Operations 2026 reveals a decisive shift toward identity‑based cyber threats across maritime, energy, enterprise and critical‑infrastructure sectors. The study, based on continuous SOC monitoring and over 200 security assessments, finds that 69% of observed risks...

Cybercriminals Now Increasingly Targeting Government Organizations, Report Reveals
Kaspersky’s 2025 threat report shows government entities accounted for 19% of high‑severity breaches, making them the top target, while industrial firms followed at 17%. The IT sector rose to third place with 15% of serious incidents, pushing finance out of...
Microsoft Adds Windows Protections for Malicious Remote Desktop Files
Microsoft rolled out new Windows defenses against RDP‑phishing attacks in the April 2026 cumulative updates for Windows 10 (KB5082200) and Windows 11 (KB5083769, KB5082052). The changes introduce a one‑time educational prompt and a persistent security dialog that disables all resource redirections by default....
TRON Launches First Post‑quantum Blockchain Upgrade
While Bitcoin debates whether to freeze vulnerable coins and Ethereum forms research committees, TRON is building. Today I'm announcing that TRON is officially launching its post-quantum upgrade initiative. TRON will be the first major public blockchain to deploy NIST-standardized post-quantum cryptographic...

Simaril Delivers SOTA LLM Prompt Injection Defense for Enterprises
Simaril (YC Spring 2026) is SOTA prompt injection defense for LLMs. This is the missing link for OpenClaw for Enterprise and all agents working on mission-critical data and workflows. The cofounders were the team that stopped billions of dollars worth...

Fraudulent Cryptocurrency App in Mac App Store Stole $9.5 Million From 50-Some Users
April 2026 saw a cascade of high‑profile crypto security breaches, starting with a counterfeit Ledger wallet app on Apple’s App Store that siphoned $9.5 million from roughly 50 users. Within the same month, Bitcoin Depot’s ATM network lost $3.67 million, Hyperbridge’s bridge contract...

Microsoft Ends Desktop Detour for Sensitivity Labels in Office Web Apps
Microsoft has updated Office for the web to let users apply sensitivity labels with custom permissions directly in Word, Excel and PowerPoint. The new Permissions dialog mirrors the desktop experience, enabling the assignment of Viewer, Editor or Owner roles without...

Anthropic Mythos Prompting Calls for More Security Measures
Anthropic unveiled its cybersecurity‑focused large language model, Mythos, under Project Glasswing, granting limited access to select vendors and enterprises. The model can ingest code and automatically surface exploitable vulnerabilities, prompting warnings from Federal Reserve Chair Jerome Powell and Treasury Secretary...

N-Able CEO: MSPs Must Shift To AI-Driven Cyber Resiliency As Agents Ramp Up
N‑able CEO John Pagliuca warned that managed service providers (MSPs) must adopt AI‑driven cyber‑resiliency as thousands of autonomous agents outpace human capacity. He likened resilience to health‑tracking wearables, emphasizing outcomes over jargon and urging a full‑stack, end‑to‑end experience. To enable...
Tax Season Scams 2026: How IRS Phishing, Fake Tax Messages, and AI Fraud Threaten Businesses
The 2026 tax season is seeing a surge in sophisticated scams that blend traditional IRS impersonation with AI‑generated messages, QR‑code links, and polished phishing campaigns. Microsoft reported over 29,000 users in 10,000 organizations targeted by tax‑related phishing, while a February...
Why We Chose the Harder Path: Docker Hardened Images, One Year Later
One year after launching Docker Hardened Images (DHI), Docker reports over 500,000 daily pulls and more than one million builds, with a catalog exceeding 2,000 hardened images, Helm charts, and system packages across Debian and Alpine. The DHI Community tier...
First Self‑Healing Prompt Defense Doubles Detection, Speeds Response Tenfold
Silmaril (@Silmarildev) is the first self-healing prompt injection defense. It catches 2x more attacks 10x faster than leading defenses, and retrains continuously to protect your full AI stack, including agents like Claude Code and OpenClaw. Congrats on the launch, @aumup001 and @EduardoVel36291! https://t.co/uq6sS4jG5i

Privilege Elevation Dominates Massive Microsoft Patch Update
Microsoft’s April 2026 Patch Tuesday addressed a near‑record 165 CVEs, with elevation‑of‑privilege bugs comprising a record 57% of the fixes. Attackers are already exploiting a SharePoint spoofing zero‑day (CVE‑2026‑32201), while another high‑severity flaw (CVE‑2026‑33825) in Defender antimalware remains unexploited but...

Enable WhatsApp Two‑Step Verification: Better Than Nothing
Whether you just joined @WhatsApp or have been using it for years, it's a smart idea to enable two-step verification. Here's how, step by step, and why it's not as good as 2-factor authentication, but better than nothing... https://t.co/KDT8J6yjkd #whatsapp...
AI Agents Emerging as New Cyber Threat Vector
Great connecting wit @okta ’ #RSAC. We had a compelling conversation about the rise of #AI agents as a new threat vector 📍FULL episode https://t.co/mZvkH86uQI 📍Learn more https://t.co/A08K78GmfH #Oktapartner #AI #cybersecurity #AgenticAI https://t.co/pkBagPpVI0

Microsoft Discloses ‘Monstrous’ Number Of Bugs As AI Discoveries Surge: Researcher
Microsoft’s April Patch Tuesday released 163 CVEs, the second‑largest monthly batch in its history. TrendAI researcher Dustin Childs attributes the surge to AI‑driven vulnerability discovery, noting that AI‑generated submissions have roughly tripled. The release follows Anthropic’s claim that its upcoming...

ZeroTier Named Cyber Security Solution of the Year 2026
ZeroTier was named Cyber Security Solution of the Year 2026 by The Cyber Security Review. The award highlights its software‑defined networking platform that secures AI‑driven traffic and meets NIST/NSA CNSA 2.0 post‑quantum standards. CEO Andrew Gault said the honor validates ZeroTier’s...

Claude Mythos: Prepare for Your Board’s Cybersecurity Questions About the Latest AI Model From Anthropic
Anthropic unveiled Claude Mythos Preview, its most powerful frontier AI model, capable of autonomously discovering software vulnerabilities that have evaded human researchers. The Federal Reserve’s upcoming meeting with bank CEOs highlights growing board-level concern over AI‑driven cyber risk. Organizations are...

Invicti Launches DAST-to-SAST Correlation
Invicti announced a new DAST-to-SAST correlation feature that links runtime vulnerability scans with static code analysis. The capability maps verified DAST findings to exact source‑code lines, developer ownership, and remediation steps within a single workflow. By overlaying results on a...