Know What's Happening in Cybersecurity

Today's Cybersecurity Pulse

Microsoft releases record‑size Patch Tuesday for April

The April update cycle delivered 165 patches addressing roughly 340 unique CVEs, including two zero‑day flaws, one of which is already being exploited in the wild. Microsoft urges immediate deployment across all product families.

Philippines Launches Broad Crackdown on Deepfakes as AI Drives Identity Fraud Surge
NewsApr 14, 2026

Philippines Launches Broad Crackdown on Deepfakes as AI Drives Identity Fraud Surge

The Philippines has launched a whole‑of‑government campaign against deepfakes and disinformation, formalized by a memorandum of agreement among the Department of Justice, the Presidential Communications Office and the Department of Information and Communications Technology. The initiative comes amid a dramatic...

By Biometric Update
Microsoft Patches Exploited SharePoint Zero-Day and 160 Other Vulnerabilities
NewsApr 14, 2026

Microsoft Patches Exploited SharePoint Zero-Day and 160 Other Vulnerabilities

Microsoft’s April 2026 Patch Tuesday delivered fixes for 165 vulnerabilities, highlighted by an exploited SharePoint Server zero‑day (CVE‑2026‑32201) rated “important” with a CVSS score of 6.5. The flaw enables network‑level spoofing and has been added to CISA’s Known Exploited Vulnerabilities list, prompting...

By SecurityWeek
Microsoft Releases Windows 10 KB5082200 Extended Security Update
NewsApr 14, 2026

Microsoft Releases Windows 10 KB5082200 Extended Security Update

Microsoft released the Windows 10 KB5082200 extended security update, addressing the April 2026 Patch Tuesday fixes. The update patches 167 vulnerabilities, including two zero‑day flaws, and upgrades Windows 10 to build 19045.7184 (Enterprise LTSC 2021 to 19044.7184). It adds RDP file phishing protections, Secure Boot status...

By BleepingComputer
Joint Industry Perspective Released by the Industrial Security Harmonization Group (ISHG)
NewsApr 14, 2026

Joint Industry Perspective Released by the Industrial Security Harmonization Group (ISHG)

The Industrial Security Harmonization Group (ISHG) released a joint industry perspective emphasizing that industrial cybersecurity depends on how communication protocols are deployed and managed, not merely on the protocols themselves. The group—comprising FieldComm, ODVA, OPC Foundation, and Profibus & Profinet International— stresses...

By Control Design
McGraw-Hill Confirms Data Breach Following Extortion Threat
NewsApr 14, 2026

McGraw-Hill Confirms Data Breach Following Extortion Threat

McGraw‑Hill disclosed that hackers leveraged a misconfigured Salesforce page to view a limited set of internal data. The company emphasized that the breach did not compromise its Salesforce accounts, customer databases, courseware, or any sensitive student information. Extortion group ShinyHunters...

By BleepingComputer
Microsoft’s April 2026 Patch Tuesday Addresses 163 CVEs (CVE-2026-32201)
NewsApr 14, 2026

Microsoft’s April 2026 Patch Tuesday Addresses 163 CVEs (CVE-2026-32201)

Microsoft’s April 2026 Patch Tuesday released updates for 163 CVEs, including eight critical and 154 important vulnerabilities. The update contains two zero‑day flaws, one of which (CVE‑2026‑32201) was exploited in the wild targeting SharePoint. Notable critical issues include a remote...

By Security Boulevard
Anthropic Mythos: Separating Signal From Hype
NewsApr 14, 2026

Anthropic Mythos: Separating Signal From Hype

Anthropic’s Mythos model pushes large‑language‑model reasoning into full codebases, enabling multi‑step vulnerability discovery and realistic exploit chaining. While it outperforms earlier LLMs that suffered from context fragmentation, its power hinges on having source‑code visibility, making closed‑source and SaaS environments less...

By Security Boulevard
War with Iran Raises Proxy Attack Risk and Cyber Threats in Southeast Europe
NewsApr 14, 2026

War with Iran Raises Proxy Attack Risk and Cyber Threats in Southeast Europe

Tensions between Iran and pro‑U.S./pro‑Israel Balkan states have moved from rhetoric to concrete threats, including cyberattacks on Albanian government systems and proxy‑style terrorist plots. Albania and Kosovo have labeled Iran a state sponsor of terrorism, while Montenegro, North Macedonia and...

By Homeland Security Today (HSToday)
How to Hide Sensitive Info From Your Notifications
NewsApr 14, 2026

How to Hide Sensitive Info From Your Notifications

The FBI recently recovered deleted Signal messages from a defendant’s iPhone by extracting them from the device’s push‑notification database, exposing a hidden privacy flaw. iOS, macOS, Android and Windows all retain notification content, even after an app is removed, making...

By Lifehacker
Ransomware Groups Are Actively Disabling Your EDR Before You Even Know It
NewsApr 14, 2026

Ransomware Groups Are Actively Disabling Your EDR Before You Even Know It

Ransomware groups are increasingly deploying “EDR killers” to silently disable endpoint detection and response tools before launching encryption. By first neutralizing security agents, attackers create a blind spot that lets them move laterally, elevate privileges, and establish persistence without triggering...

By Security Boulevard
Hackers Are Targeting Critical Infrastructure to Cause Real-World Damage
NewsApr 14, 2026

Hackers Are Targeting Critical Infrastructure to Cause Real-World Damage

Hackers linked to Iran’s CyberAv3ngers group are shifting from symbolic cyber‑espionage to sabotage of U.S. critical infrastructure. They are exploiting internet‑exposed programmable logic controllers in water, energy and industrial environments, enabling direct physical disruption. The attacks expose the danger of...

By Security Boulevard
Google Rolls Out Gmail Encryption and Meet on Android Auto
NewsApr 14, 2026

Google Rolls Out Gmail Encryption and Meet on Android Auto

Google announced that Gmail will now support end‑to‑end encryption for personal and enterprise users, leveraging OpenPGP standards. At the same time, the company integrated Google Meet into Android Auto, allowing drivers to join video calls hands‑free. The encryption feature rolls...

By PaySpace Magazine
Hackers Are Using GitHub and Jira to Bypass Your Security
NewsApr 14, 2026

Hackers Are Using GitHub and Jira to Bypass Your Security

Hackers are weaponizing collaboration platforms such as GitHub and Jira by sending malicious links through native notifications like pull‑request updates and ticket comments. Because these alerts originate from trusted services, they often evade email gateways and endpoint filters. The attacks...

By Security Boulevard
California’s Cybersecurity Audit Rule Is Now in Effect: Its Impact for Class Litigation
NewsApr 14, 2026

California’s Cybersecurity Audit Rule Is Now in Effect: Its Impact for Class Litigation

The California Privacy Protection Agency’s new cybersecurity audit rule took effect on Jan. 1, 2026, obligating certain businesses to conduct and certify an annual audit covering 18 technical and organizational safeguards. While the audit report itself is not filed publicly, the certification...

By DataBreaches.net
Building a CUI Enclave in Fintech: A Practical Guide to CMMC Compliance
BlogApr 14, 2026

Building a CUI Enclave in Fintech: A Practical Guide to CMMC Compliance

Fintech firms handling Controlled Unclassified Information (CUI) are increasingly required to isolate that data in hardened digital enclaves to meet Cybersecurity Maturity Model Certification (CMMC) standards. The latest CMMC 2.0 condenses the original five levels into three, with Level 2 aligning...

By HedgeThink
Ethereum Foundation Launches Audit Subsidy Program for Builders
NewsApr 14, 2026

Ethereum Foundation Launches Audit Subsidy Program for Builders

The Ethereum Foundation announced a new audit subsidy program aimed at lowering the cost of security audits for developers building on Ethereum. The initiative, launched in partnership with leading audit firms, will provide financial assistance to eligible projects, making professional...

By The Defiant
Hardening the Silicon: Why Analog Anti-Tamper IP Is the New Security Baseline
BlogApr 14, 2026

Hardening the Silicon: Why Analog Anti-Tamper IP Is the New Security Baseline

Analog anti‑tamper IP is emerging as a baseline for hardware security as billions of IoT and automotive SoCs face increasingly sophisticated physical attacks. Hackers now employ fault injection, glitching, side‑channel, and micro‑probing techniques that can bypass software‑only protections and compromise...

By SemiWiki
TechJutsu Launches Browser Extension to Bring MFA to the Web
NewsApr 14, 2026

TechJutsu Launches Browser Extension to Bring MFA to the Web

TechJutsu, a Calgary‑based identity‑access firm founded in 2015, unveiled its Caller Verify Universal Connector, a browser extension that embeds multi‑factor authentication (MFA) into any web application. The plug‑in works in Chrome and Edge and integrates with major CRM and collaboration...

By BetaKit (Canada)
SEAL Alliance Offers Essential Crypto Security Playbooks Amid Rising Threats
SocialApr 14, 2026

SEAL Alliance Offers Essential Crypto Security Playbooks Amid Rising Threats

.@_SEAL_Org has been publishing "the most practical tips" for crypto operations and security, like for multisigs. They ask teams to think about what privileged actions should exist, they have playbooks for incident response, how to coordinate disclosures, etc. -- @TuongvyLe12...

By Laura Shin
Passwords and 2FA Are Cumbersome; Security Needs Simplicity
SocialApr 14, 2026

Passwords and 2FA Are Cumbersome; Security Needs Simplicity

All good and fine, but the fundamental problem is that long, complex passwords and 2FA are a pain in the a**. The cybersecurity industry needs to come up with a creative way to make our devices and apps more secure,...

By Tom Pick
How Your CCTV Becomes a Hacker’s Spy
NewsApr 14, 2026

How Your CCTV Becomes a Hacker’s Spy

CCTV systems are increasingly exploited by hackers who use default factory passwords to breach IP cameras worldwide. In India, a cyber‑crime ring stole 50,000 video clips from 80 cameras across 20 states, selling each for roughly $9‑$50. In response, India...

By The Hindu BusinessLine — Economy/Markets
Unseen AI, Unchecked Risk: The CISO Wake-Up Call
NewsApr 14, 2026

Unseen AI, Unchecked Risk: The CISO Wake-Up Call

Shadow AI—unauthorized use of generative AI tools—is emerging as a blind spot for security teams, exposing proprietary code and sensitive data without detection. More than a third of companies still lack formal AI compliance policies, leaving employees free to paste...

By ChannelE2E
Fake Ledger Live App on Apple’s App Store Stole $9.5M in Crypto
NewsApr 14, 2026

Fake Ledger Live App on Apple’s App Store Stole $9.5M in Crypto

A counterfeit Ledger Live macOS app posted on Apple’s App Store siphoned roughly $9.5 million in cryptocurrency from about 50 users within days. Victims entered seed phrases, giving attackers control over wallets across Bitcoin, Ethereum, Tron, Solana and Ripple. The stolen...

By BleepingComputer
Reevaluating Security Basics for Modern AI Threats
SocialApr 14, 2026

Reevaluating Security Basics for Modern AI Threats

Which "security basics" are more relevant today vs potential AI attackers and which basics don't matter anymore? #question

By Dr. Anton Chuvakin
Venice Hydraulic Pump System Hacked, Hackers Claim Power to Create Floods
NewsApr 14, 2026

Venice Hydraulic Pump System Hacked, Hackers Claim Power to Create Floods

A hacker group identifying as “Infrastructure Destruction Squad” or “Dark Engine” claims to have breached Venice’s hydraulic pump system that protects Piazza San Marco, asserting it can open floodgates. The group says it stole administrative credentials for the flood‑risk management...

By Security Magazine (Cybersecurity)
Black Basta’s Playbook Lives on as Former Affiliates Launch Fast-Scale Intrusion Campaign
NewsApr 14, 2026

Black Basta’s Playbook Lives on as Former Affiliates Launch Fast-Scale Intrusion Campaign

A loose network of former Black Basta affiliates has launched a fast‑scale intrusion campaign, targeting over 100 senior employees across dozens of organizations. The attackers employ mass email bombing and Microsoft Teams help‑desk impersonation to gain rapid remote access, often...

By CyberScoop
Virginia Governor Signs Law Banning Sales Of Location Data
NewsApr 14, 2026

Virginia Governor Signs Law Banning Sales Of Location Data

Virginia Governor Abigail Spanberger signed Senate Bill 338, a privacy law that bans the sale of precise location data within a 1,750‑foot radius. The measure, effective July, replaces the 2021 consent‑based framework and joins Maryland and Oregon in prohibiting such...

By MediaPost
CowSwap Front-End Under Attack; Use Aave via ParaSwap
SocialApr 14, 2026

CowSwap Front-End Under Attack; Use Aave via ParaSwap

CowSwap front-end (not related to Aave) is experiencing web2-style attack. Avoid interacting with the interface until further notice from their team. Aave interface swaps are routed via ParaSwap to ensure continuity. Stay safe.

By Stani Kulechov
Quantum Threats Could Undermine Bitcoin’s Private‑Key Ownership
SocialApr 14, 2026

Quantum Threats Could Undermine Bitcoin’s Private‑Key Ownership

"The question quantum raises for me as a laywer is that Bitcoin's notion of ownership rests on you owning your private key. But if quantum allows someone else to make that signature, then whose bitcoin is it?" -- 👀 @kkirkbos https://t.co/jY4EquQA7V

By Laura Shin
Comcast Agrees to $117 Million Settlement Over 2023 Data Breach
BlogApr 14, 2026

Comcast Agrees to $117 Million Settlement Over 2023 Data Breach

Comcast has agreed to a proposed $117.5 million settlement to resolve a class‑action lawsuit stemming from a data breach in October 2023. The breach exposed customers’ personal information after a third‑party gained unauthorized access. The settlement fund will pay claimants for documented...

By Miles to Memories
War Game Exercise Demonstrates How Social Media Manipulation Works
NewsApr 14, 2026

War Game Exercise Demonstrates How Social Media Manipulation Works

University of New South Wales turned a classroom exercise into a four‑week war‑game called “Capture the Narrative.” Over 270 participants from 18 Australian universities deployed AI‑driven bots on a custom social‑media sandbox, Legit Social, to sway a simulated South‑Pacific island...

By Dark Reading
A16Z‑backed Doublespeed Hacked, Exposing AI‑generated TikTok Accounts
NewsApr 14, 2026

A16Z‑backed Doublespeed Hacked, Exposing AI‑generated TikTok Accounts

Doublespeed, the a16z‑funded phone‑farm startup that creates AI‑generated TikTok influencers, was breached for a second time, exposing 573 accounts and 47 MB of data. The hacker attempted to post a meme calling a16z the “antichrist,” but the company says no unauthorized...

By Pulse
8 Wi-Fi Security Guidelines Issued by Wireless Broadband Alliance
NewsApr 14, 2026

8 Wi-Fi Security Guidelines Issued by Wireless Broadband Alliance

The Wireless Broadband Alliance (WBA) has published eight security guidelines aimed at elevating Wi‑Fi networks to carrier‑grade protection. The recommendations span certificate‑based authentication, WPA3‑Enterprise encryption, privacy‑preserving identities, end‑to‑end credential safeguards, hardened access‑network infrastructure, and secure AAA signaling. They also stress...

By EDN
WBA Unveils Framework to Boost Wi‑Fi Security, Privacy
SocialApr 14, 2026

WBA Unveils Framework to Boost Wi‑Fi Security, Privacy

WBA's new Wi-Fi Security Guidelines report defines "a new industry framework designed to strengthen security, privacy and trust across Wi-Fi networks, including public, enterprise, IoT and roaming environments." https://t.co/vlrgPy3QiH

By Mike Dano
EFF to State AGs: Investigate Google's Broken Promise to Users Targeted by the Government
BlogApr 14, 2026

EFF to State AGs: Investigate Google's Broken Promise to Users Targeted by the Government

The Electronic Frontier Foundation filed complaints with the California and New York attorneys general accusing Google of violating its promise to notify users before handing over data to law‑enforcement agencies. The complaint centers on Amandla Thomas‑Johnson, whose ICE subpoena was...

By Electronic Frontier Foundation — Deeplinks —
Your Accountant Handles Your Books. Let CyberFin Handle Your Cybersecurity
BlogApr 14, 2026

Your Accountant Handles Your Books. Let CyberFin Handle Your Cybersecurity

CyberFin urges insurance agencies to treat cybersecurity like accounting or HR by delegating it to specialists. The firm provides a managed security service that monitors firewalls, endpoints and a security operations center, and offers a free cyber assessment to pinpoint...

By The CyberFin Substack
Open‑source AI Tool Detects Real Bugs Automatically
SocialApr 14, 2026

Open‑source AI Tool Detects Real Bugs Automatically

Open sourced simple AI model that finds real bugs, from the folks at @Aisle_Inc . Is it getting hot in here? 🔥

By Katie Moussouris
OpenSSL 4.0.0 Release Cuts Deprecated Protocols and Gains Post-Quantum Support
NewsApr 14, 2026

OpenSSL 4.0.0 Release Cuts Deprecated Protocols and Gains Post-Quantum Support

OpenSSL has released version 4.0.0, removing legacy protocols such as SSLv3 and the SSLv2 client hello, and eliminating the engine API. The update introduces Encrypted Client Hello (ECH) per RFC 9849 and adds several post‑quantum cryptographic primitives, including the hybrid curveSM2MLKEM768...

By Help Net Security
Editorial. Cyber Insecurity
NewsApr 14, 2026

Editorial. Cyber Insecurity

The Reserve Bank of India’s latest discussion paper reveals a dramatic surge in digital fraud, with reported incidents climbing from 260,000 in 2021 to 2.8 million in 2025 and losses swelling from roughly $67 million to $2.8 billion. The paper attributes much of...

By The Hindu BusinessLine — Economy/Markets
Pro-Iranian Actor Claims L.A. Metro Cyberattack
NewsApr 14, 2026

Pro-Iranian Actor Claims L.A. Metro Cyberattack

Last month, Los Angeles Metro shut down portions of its network after detecting a cyber intrusion, and it is still working to restore services. Intelligence from Dataminr attributes the attack to a pro‑Iranian hacktivist group called Ababil of Minab, which...

By Security Magazine (Cybersecurity)
AI Treated as Force-Multiplier for Cyber Losses. Introduces Aggregation, Correlation Risks: CyberCube
NewsApr 14, 2026

AI Treated as Force-Multiplier for Cyber Losses. Introduces Aggregation, Correlation Risks: CyberCube

CyberCube warns that artificial intelligence is becoming a force‑multiplier for cyber losses, accelerating attack speed and scale. The firm says AI compresses the cyber‑attack lifecycle, making recovery capability a key loss driver. It urges insurers and reinsurers to embed AI‑specific...

By Artemis (ILS/cat bonds)
LMT's Security System Blocks over 2 Mln Spam Calls in First 2 Months
BlogApr 14, 2026

LMT's Security System Blocks over 2 Mln Spam Calls in First 2 Months

Latvian telecom operator LMT reported that its Call Firewall solution blocked more than 2.3 million spam calls in the first two months since rollout. The system, part of a broader industry initiative to curb fraudulent calls, saw a sharp spike in...

By Telecompaper
April Patch Tuesday Brings Zero-Days in Defender, SharePoint Server
NewsApr 14, 2026

April Patch Tuesday Brings Zero-Days in Defender, SharePoint Server

Microsoft’s April 2026 Patch Tuesday shipped more than 160 Microsoft updates, including two actively‑exploited zero‑day flaws. The SharePoint Server XSS (CVE‑2026‑32201) can be triggered without authentication, while the Defender elevation‑of‑privilege bug (CVE‑2026‑33825) has public proof‑of‑concept code. A third zero‑day in Chromium’s...

By ComputerWeekly
Your Biggest Cyber Risk: Trusted Callers, Not Malware
SocialApr 14, 2026

Your Biggest Cyber Risk: Trusted Callers, Not Malware

Your biggest cyber risk is not malware. It's a polite caller who knows your helpdesk script. In one case, attackers used OAuth tokens & APIs to pull 3TB in 39 seconds. No malware. No phishing link. When...

By Wendi Whitmore
This New Tool Can Steal Your Passwords And Info – Even With 2FA Enabled
NewsApr 14, 2026

This New Tool Can Steal Your Passwords And Info – Even With 2FA Enabled

Storm, a new Windows‑only infostealer discovered in early 2026, can steal encrypted browser data, decrypt it on remote servers, and use harvested session cookies to bypass two‑factor authentication. The malware exfiltrates passwords, autofill details, crypto‑wallet credentials, and messaging app data,...

By SlashGear
Brute-Force Cyberattacks Originating in Middle East Surge in Q1
NewsApr 14, 2026

Brute-Force Cyberattacks Originating in Middle East Surge in Q1

Barracuda reported a sharp rise in brute‑force authentication attacks on network devices during Q1 2026, with roughly 90% of the activity traced to Middle‑East sources. SonicWall and Fortinet FortiGate firewalls were the most frequently targeted, accounting for over half of the...

By Cybersecurity Dive (Industry Dive)
Cloudflare Partners with Wiz to Secure the Global AI Attack Surface, Eliminating Blind Spots Caused by Shadow AI
NewsApr 14, 2026

Cloudflare Partners with Wiz to Secure the Global AI Attack Surface, Eliminating Blind Spots Caused by Shadow AI

Cloudflare announced a partnership with Wiz, now part of Google Cloud, to embed its AI Security for Apps into Wiz’s Security Graph. The integration creates a unified, model‑agnostic view of an organization’s AI footprint, detecting shadow AI, prompt‑injection attacks and...

By AiThority » Sales Enablement
AI-Driven Pushpaganda Scam Exploits Google Discover to Spread Scareware and Ad Fraud
NewsApr 14, 2026

AI-Driven Pushpaganda Scam Exploits Google Discover to Spread Scareware and Ad Fraud

Cybersecurity firm HUMAN uncovered a new ad‑fraud operation dubbed Pushpaganda that weaponizes AI‑generated news articles to infiltrate Google Discover. The scheme tricks Android and Chrome users into enabling push notifications that deliver scareware and financial scams, driving traffic to malicious...

By The Hacker News
Cloudflare Launches Mesh to Secure the AI Agent Lifecycle
NewsApr 14, 2026

Cloudflare Launches Mesh to Secure the AI Agent Lifecycle

Cloudflare announced Mesh, a private networking solution built for AI agents that unifies agents, humans, and multicloud infrastructure into a single secure fabric. The service replaces legacy VPNs and manual tunnels, letting developers provision private connectivity in minutes while keeping...

By AiThority » Sales Enablement