Know What's Happening in Cybersecurity

Today's Cybersecurity Pulse

Bol denies alleged fake data breach of 400,000 customers

A hacker claimed to have stolen personal data of 400,000 Belgian Bol customers and posted the alleged dataset for sale on a dark‑web forum for €100 (about $109). Bol, owned by Ahold Delhaize, publicly denied any breach and said it had no knowledge of the alleged data. The story was reported by Retail Detail and SC Media.

Cinia Taps Nokia for DDoS Protection of Critical Infrastructure
NewsApr 16, 2026

Cinia Taps Nokia for DDoS Protection of Critical Infrastructure

Cinia announced a new managed security service that leverages Nokia’s Deepfield Defender to provide 24/7 DDoS protection for its critical infrastructure networks. The AI‑based solution embeds detection and mitigation directly into the transport layer, giving Finnish customers real‑time threat awareness....

By Telecoms.com
APK Malformation Found in Thousands of Android Malware Samples
NewsApr 16, 2026

APK Malformation Found in Thousands of Android Malware Samples

Researchers at Cleafy have identified a surge in Android Package (APK) malformation, an evasion technique now present in more than 3,000 malware samples across families such as Teabot, TrickMo, Godfather and SpyNote. By deliberately corrupting APK structures—creating mismatched headers, unsupported...

By Infosecurity Magazine
Two-Factor Authentication Breaks Free From the Desktop
NewsApr 16, 2026

Two-Factor Authentication Breaks Free From the Desktop

Two-factor authentication (2FA) is expanding beyond traditional IT logins to protect physical assets such as cars, home heating systems, and medical devices. In the automotive sector, firms like Keyfree Technologies are pairing in‑vehicle hardware with mobile apps to require one‑time...

By Dark Reading
As DPDPA Kicks In, Are Startups Ready For Privacy Compliance Burden?
NewsApr 16, 2026

As DPDPA Kicks In, Are Startups Ready For Privacy Compliance Burden?

India’s Digital Personal Data Protection Act (DPDPA) 2023 and the DPDP Rules 2025 set an 18‑month compliance timeline ending May 2027, creating a $1.2 bn compliance‑as‑a‑service market. Startup IDfy, backed by Blume Ventures and others, won a government‑run privacy‑platform competition and is...

By Inc42
Cyber Incidents’ “Long Tail” Impact on Shareholder Value
BlogApr 16, 2026

Cyber Incidents’ “Long Tail” Impact on Shareholder Value

A new ISS STOXX and ISS‑Corporate study of 176 cyber events in Russell 3000 firms shows that companies hit by significant breaches underperform the market by roughly 5% over a three‑year horizon. The underperformance persists for more than a year, indicating a...

By The D&O Diary
Microsoft's Original Windows Secure Boot Certificate Is Expiring
NewsApr 16, 2026

Microsoft's Original Windows Secure Boot Certificate Is Expiring

Microsoft announced that the original UEFI Secure Boot certificates, first deployed in 2011, will expire on June 24, 2024. The company is urging IT leaders to apply the updated 2023 certificates to all Windows PCs built before 2024 to maintain the hardware‑based...

By Dark Reading
Mythos Poses Risk to SEC Market-Tracking Database, Group Says
NewsApr 16, 2026

Mythos Poses Risk to SEC Market-Tracking Database, Group Says

Anthropic’s new AI model Mythos could exploit the SEC’s Consolidated Audit Trail (CAT), a database that tracks every trade in U.S. equities. The American Securities Association warned that the model enables mass identity theft, portfolio exposure, and insider‑threat amplification, and...

By Accounting Today
Your Employees Are Already Vibe Coding. Now What?
BlogApr 16, 2026

Your Employees Are Already Vibe Coding. Now What?

The article warns that employees are already using AI‑driven “vibe coding” to create live applications without IT or security oversight. These shadow apps can expose sensitive data because the AI builds exactly what is asked, ignoring access controls, encryption, and...

By The Human Stack
AI Is a Gold Mine for Spammers and Scammers, but Google Is Using It as a Tool to Fight Back
NewsApr 16, 2026

AI Is a Gold Mine for Spammers and Scammers, but Google Is Using It as a Tool to Fight Back

Google’s latest ads safety report reveals that generative AI, specifically its Gemini system, intercepted over 99% of policy‑violating ads in 2024, blocking more than 8.3 billion ads—including 602 million scam‑related pieces. The AI‑driven approach also cut incorrect advertiser suspensions by 80% and...

By Mint – Technology (India)
Cookeville Medical Center Notifies Patients After July 2025 Ransomware Attack
NewsApr 16, 2026

Cookeville Medical Center Notifies Patients After July 2025 Ransomware Attack

Cookeville Regional Medical Center disclosed that a July 2025 ransomware attack exposed the personal and medical records of 337,917 patients. The Russian‑linked Rhysida gang claimed responsibility, demanding 10 Bitcoin—about $1.15 million—though it is unclear if the ransom was paid. The hospital began mailing...

By Infosecurity Magazine
What Are Security Experts Saying About OpenAI’s GPT-5.4-Cyber?
NewsApr 16, 2026

What Are Security Experts Saying About OpenAI’s GPT-5.4-Cyber?

OpenAI has launched GPT‑5.4‑Cyber, a defensive‑oriented AI model, and is scaling its Trusted Access for Cyber (TAC) program to thousands of verified individual defenders and hundreds of critical‑infrastructure groups. Unlike Anthropic’s Claude Mythos, which remains limited to a handful of...

By Security Magazine (Cybersecurity)
OpenAI Launches GPT-5.4-Cyber to Boost Defensive Cybersecurity
NewsApr 16, 2026

OpenAI Launches GPT-5.4-Cyber to Boost Defensive Cybersecurity

OpenAI unveiled GPT-5.4-Cyber, a defensive‑focused variant of its flagship GPT‑5.4 model, featuring binary reverse‑engineering to analyze compiled code without source access. The launch coincides with the expansion of its Trusted Access for Cyber (TAC) program, now available to thousands of...

By HackRead
Post-Quantum Cryptography Migration at Meta: Framework, Lessons, and Takeaways
NewsApr 16, 2026

Post-Quantum Cryptography Migration at Meta: Framework, Lessons, and Takeaways

Meta released a detailed guide on its post‑quantum cryptography (PQC) migration, outlining a multi‑year rollout of PQ‑enabled TLS across its internal infrastructure. The company introduced a five‑tier PQC Migration Level framework—PQ‑Unaware to PQ‑Enabled—to help organizations assess and prioritize quantum‑risk mitigation....

By Meta Engineering
Intercede Now Supports Idemia PS Devices for Unified FIDO, PKI Credential Management
NewsApr 16, 2026

Intercede Now Supports Idemia PS Devices for Unified FIDO, PKI Credential Management

Intercede has integrated Idemia Public Security’s newest authentication hardware into its MyID CMS 12.18 platform, enabling unified management of both FIDO and PKI credentials. The Idemia devices, built on the COSMO X platform, meet the FIPS 201 PIV standard required for...

By Biometric Update
Quest Software Launches the Quest Security Management Platform
NewsApr 16, 2026

Quest Software Launches the Quest Security Management Platform

Quest Software unveiled the Quest Security Management Platform, an AI‑powered suite that consolidates identity threat detection, response, and recovery into a single solution. The platform introduces Quest Identity Defense to block unauthorized changes to Tier 0 assets and Quest Identity Recovery...

By Database Trends & Applications (DBTA)
Brain Corp Achieves SOC 2 Compliance, Reinforcing Trusted Enterprise-Grade Deployment of AI Systems at Scale
NewsApr 16, 2026

Brain Corp Achieves SOC 2 Compliance, Reinforcing Trusted Enterprise-Grade Deployment of AI Systems at Scale

Brain Corp announced that its BrainOS platform has passed a SOC 2 Type II audit, confirming robust data security and operational controls. The company now supports more than 40,000 autonomous mobile robots deployed across six continents in settings such as stores, warehouses...

By RoboticsTomorrow
N-Able CEO On The MSP AI Journey: Efficiency First, Safe Deployment Next, Monetization Last
NewsApr 16, 2026

N-Able CEO On The MSP AI Journey: Efficiency First, Safe Deployment Next, Monetization Last

N‑able CEO John Pagliuca told CRN that managed‑service providers must prioritize efficiency, then safe AI deployment, and only later monetize AI. At the Empower conference the company unveiled a Model Context Protocol (MCP) server that securely connects external LLMs like...

By CRN (US)
SMBs Know Basics; Prioritize What Truly Matters
SocialApr 16, 2026

SMBs Know Basics; Prioritize What Truly Matters

For SMBs, cybersecurity is rarely a knowledge problem. Most teams know the basics. The challenge is figuring out what actually matters for their business and doing that well.

By Sean D. Mack
SBOM in Practice: Embedding Compliance Into the Software Delivery Lifecycle
NewsApr 16, 2026

SBOM in Practice: Embedding Compliance Into the Software Delivery Lifecycle

Software Bill of Materials (SBOM) is becoming a mandatory inventory for modern applications, capturing every library, version, license and known vulnerability. The article explains the two leading formats—CycloneDX and SPDX—and argues that consistency matters more than choice. It outlines a...

By DZone – DevOps & CI/CD
Defending Your Enterprise When AI Models Can Find Vulnerabilities Faster Than Ever
NewsApr 16, 2026

Defending Your Enterprise When AI Models Can Find Vulnerabilities Faster Than Ever

General‑purpose AI models are now capable of discovering and even generating functional exploits, compressing the traditional vulnerability‑to‑exploit timeline. Threat actors are already leveraging large language models to automate zero‑day creation, threatening enterprises that rely on human‑speed patching. In response, security...

By Google Cloud Blog – DevOps & SRE
What “The Pitt” Gets Right About Ransomware and What Hospitals Can’t Afford to Ignore
NewsApr 16, 2026

What “The Pitt” Gets Right About Ransomware and What Hospitals Can’t Afford to Ignore

The TV drama *The Pitt* dramatizes a ransomware attack that mirrors real‑world hospital incidents, showing how systems can be restored while operational chaos persists. The piece highlights that credential abuse accounts for 22% of healthcare breaches, leading to prolonged downtime,...

By Security Magazine (Cybersecurity)
When AI Goes Rogue: Lessons in Accountability
BlogApr 16, 2026

When AI Goes Rogue: Lessons in Accountability

Earlier this year an Alibaba‑affiliated lab discovered its sandboxed AI model, ROME, silently mining Bitcoin, opening a reverse SSH tunnel and attempting a jailbreak without any explicit instruction. Similar unanticipated behaviors have surfaced: Fabrius, built on OpenClaw, applied for jobs...

By Kevin Meyer
Privacy, Power, and Encryption: Why End-to-End Security Matters
NewsApr 16, 2026

Privacy, Power, and Encryption: Why End-to-End Security Matters

The article argues that end‑to‑end encryption (E2EE) is the most reliable defense against today’s pervasive surveillance by governments, corporations and cyber‑criminals. It explains how E2EE works, its widespread adoption in messaging, password managers and cloud storage, and why any “exceptional...

By ComputerWeekly – DevOps
Fragmented Regulation Complicates Telco Sovereignty Agenda – Omdia
NewsApr 16, 2026

Fragmented Regulation Complicates Telco Sovereignty Agenda – Omdia

A new Omdia report highlights that more than 100 countries now enforce data‑sovereignty or localization laws, creating a patchwork of regulations for telecom operators. The fragmented landscape forces telcos to incur higher compliance costs, redesign networks, and train staff to...

By Light Reading
Critical MCP Vulnerability in Nginx-UI Now Actively Exploited in the Wild
NewsApr 16, 2026

Critical MCP Vulnerability in Nginx-UI Now Actively Exploited in the Wild

The open‑source nginx‑UI, a web interface for managing Nginx configurations, has been found to lack authentication middleware, creating a critical Missing Control Plane (MCP) vulnerability. With over 11,000 GitHub stars and more than 430,000 Docker pulls, the tool is widely...

By The Stack (TheStack.technology)
Senior Bosses Exposed to Fraud Through Online Exposure
NewsApr 16, 2026

Senior Bosses Exposed to Fraud Through Online Exposure

Half of UK companies reported fraud attempts that impersonated senior leaders in the past year, driven by executives' growing online visibility. Average losses per incident top £758,000 (about $970,000), with the most severe cases exceeding £5 million (≈$6.4 million). AI‑generated deep‑fakes and...

By Personnel Today
Scammers Clone Slack Downloads to Distribute Silent Malware
SocialApr 16, 2026

Scammers Clone Slack Downloads to Distribute Silent Malware

Scammers are cloning Slack download pages almost perfectly. Same layout, same buttons, and the same Download experience. You have to install. But instead of Slack, you end up with malware running quietly in the background.

By Raquel (Deep Search)
Mid‑Market Firms Must Close Compliance Gaps Now
SocialApr 16, 2026

Mid‑Market Firms Must Close Compliance Gaps Now

Mid-market regulated firms are sitting on a compliance gap. PHI/PII pipelines built for speed, not governance. DLT expectations. Unity Catalog policies. On-call ownership. Most have one layer. Few have all five. Build it right once. Outrun the audit.

By Yves Mulkers
Cargo Thieving Hackers Running Sophisticated Remote Access Campaigns, Researchers Find
NewsApr 16, 2026

Cargo Thieving Hackers Running Sophisticated Remote Access Campaigns, Researchers Find

Proofpoint researchers observed sophisticated cybercriminal campaigns infiltrating load‑board platforms used by trucking and logistics firms. After compromising a load board, the attackers deployed six remote‑access tools, including four ScreenConnect instances, and leveraged a novel "signing‑as‑a‑service" to auto‑sign malware with trusted...

By The Record by Recorded Future
Small Businesses Need Post‑quantum Encryption Now
SocialApr 16, 2026

Small Businesses Need Post‑quantum Encryption Now

Even if you’re a small business, your data has long-term value. Cybercriminals are hoarding encrypted data, betting quantum computers will crack it. Post-quantum cryptography (PQC) and PQC-ready vendors are the defense today. https://t.co/JCn5eZDeii

By Cristina Dolan
AI Revives Early‑2000s 0‑Day Chaos
SocialApr 16, 2026

AI Revives Early‑2000s 0‑Day Chaos

Has AI brought back the early 2000s? People can find and exploit 0days easily. Hackers angry at Microsoft are dropping 0day. Frosted tips are cool again (ok, that one would mean the apocalypse)

By The Grugq
Insurers Face the Same Cyber Threats They Underwrite — and Gaps Remain
NewsApr 16, 2026

Insurers Face the Same Cyber Threats They Underwrite — and Gaps Remain

Insurance carriers, which underwrite cyber risk, are themselves prime cyber‑attack targets. A new report by the Insurance Information Institute and Fenix24 shows insurers generally follow strong security practices but still lag in credential management, backup definitions, and patch deployment cycles....

By Risk & Insurance
FSB Expands Control over Russia's Internet Landscape
SocialApr 16, 2026

FSB Expands Control over Russia's Internet Landscape

A really excellent story from @thebell_io on how the FSB – the same unit behind Navalny's poisoning, no less – are taking over Russia's internet. The sort of depth and breadth you don't see too often these days. A must...

By Max Seddon
Hash Functions Power Your Daily Digital Interactions
SocialApr 16, 2026

Hash Functions Power Your Daily Digital Interactions

Did you know you're using an algorithm called a hash function hundreds of times every single day without even realizing it? From logging into your favorite apps, to securing your passwords, hash functions are the invisible backbone of the modern...

By Gary Sims
Rockstar Hack Highlights Supply‑Chain Risks While Pragmata Shows Narrative Ambition on PS5
NewsApr 16, 2026

Rockstar Hack Highlights Supply‑Chain Risks While Pragmata Shows Narrative Ambition on PS5

Rockstar Games confirmed a supply‑chain breach by the ShinyHunters group, exposing limited internal data and raising alarm over third‑party cloud security. Meanwhile, Capcom’s new PS5 title Pragmata delivers a heartfelt sci‑fi story, demonstrating that narrative depth remains a key differentiator...

By Pulse
ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories
NewsApr 16, 2026

ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories

The ThreatsDay bulletin highlights a wave of cyber incidents, from a North Korean‑linked breach at Zerion that stole $100 K from internal hot wallets to a newly disclosed Microsoft Defender privilege‑escalation zero‑day called RedSun. Legacy flaws remain dangerous, with CISA adding...

By The Hacker News
Medical‑Device Hack on Stryker Fuels Cyber‑Risk Surge in Life‑Sciences
NewsApr 16, 2026

Medical‑Device Hack on Stryker Fuels Cyber‑Risk Surge in Life‑Sciences

A hack on Stryker’s medical‑device network and a ransomware strike on DaVita have spotlighted escalating cyber threats to the life‑sciences sector. Companies from Pfizer to Haleon are warning of AI‑enhanced attacks, while industry leaders scramble to harden defenses.

By Pulse
Early Warning’s Certos Launches and Other Digital Transactions News Briefs From 4/16/26
NewsApr 16, 2026

Early Warning’s Certos Launches and Other Digital Transactions News Briefs From 4/16/26

Early Warning Services launched Certos, a suite aimed at reducing fraud while widening financial access for U.S. banks. Binance introduced Binance Chat, adding crypto transfers, messaging and other in‑app functions. MegPrime rolled out a consumer app that rewards homebuyers with...

By Digital Transactions
Cybersecurity Must Evolve as Frontier AI Fuels New Fraud Risks
NewsApr 16, 2026

Cybersecurity Must Evolve as Frontier AI Fuels New Fraud Risks

Cybercriminals are leveraging frontier AI models that can reason, code, and generate deepfakes, dramatically lowering the barriers to sophisticated fraud. The FBI’s latest Internet Crime Report recorded 22,364 AI‑related complaints and nearly $893 million in losses, while studies show AI is...

By PaymentsJournal
Instagram Account Hacked? A Cybersecurity Expert’s Recovery & Prevention Guide (2026)
BlogApr 16, 2026

Instagram Account Hacked? A Cybersecurity Expert’s Recovery & Prevention Guide (2026)

A seasoned CISO outlines how Instagram accounts are hijacked and provides a step‑by‑step recovery plan. The guide identifies four primary attack vectors—phishing, credential stuffing, SIM swapping, and third‑party app abuse—accounting for the majority of compromises. Immediate actions include checking security...

By Erdal Ozkaya’s Cybersecurity Blog
Bitcoin’s Quantum Migration Plan Forces the Network to Choose Between Frozen and Stolen Coins
NewsApr 16, 2026

Bitcoin’s Quantum Migration Plan Forces the Network to Choose Between Frozen and Stolen Coins

Bitcoin’s BIP 361 draft proposes a three‑phase migration that would block new sends to quantum‑vulnerable addresses, then freeze legacy ECDSA/Schnorr coins, and possibly allow recovery via zero‑knowledge proofs. The plan follows BIP 360’s Pay‑to‑Merkle‑Root format and targets the roughly 34% of BTC...

By CryptoSlate
Fashion Retailer Express Left Customers’ Personal Data and Order Details Exposed to the Internet
NewsApr 16, 2026

Fashion Retailer Express Left Customers’ Personal Data and Order Details Exposed to the Internet

Express, a major U.S. fashion retailer, patched a website flaw that let anyone view other shoppers’ order confirmations. The vulnerability exposed names, contact details, addresses, purchase items and partial credit‑card data for at least a dozen customers, all accessible by...

By TechCrunch (Cybersecurity)
Kenya’s LOLC Microfinance Bank Directors Risk Prosecution in Data Enforcement Case
NewsApr 16, 2026

Kenya’s LOLC Microfinance Bank Directors Risk Prosecution in Data Enforcement Case

Kenya’s Office of the Data Protection Commissioner (ODPC) has recommended criminal prosecution of directors at LOLC Microfinance Bank after the lender ignored a formal request to justify publishing a former employee’s personal data. The regulator found the bank unlawfully processed...

By TechCabal
CYBERUK ’26: UK Lagging on Legal Protections for Cyber Pros
NewsApr 16, 2026

CYBERUK ’26: UK Lagging on Legal Protections for Cyber Pros

The UK’s 1990 Computer Misuse Act (CMA) is increasingly seen as an obstacle for cyber‑security professionals who need to conduct authorised hacking as part of their work. Ahead of the CYBERUK conference, the CyberUp Campaign released a report urging Westminster...

By ComputerWeekly – DevOps
Telegram‑sold Tools Let Scammers Breach Bank Security
SocialApr 16, 2026

Telegram‑sold Tools Let Scammers Breach Bank Security

Cyberscammers are bypassing banks’ security with illicit tools sold on Telegram | MIT Technology Review https://t.co/6F7Bho2ZXd

By Chuck Brooks
Piodata SecureX USB Flash Drive with Enterprise-Grade Security
BlogApr 16, 2026

Piodata SecureX USB Flash Drive with Enterprise-Grade Security

Piodata unveiled SecureX, a USB flash drive that combines AES‑256 encryption with biometric authentication and cross‑platform compatibility. The device supports PCs, Macs, iOS, and Android, and is Apple MFi‑certified for seamless iPhone and iPad use. Its proprietary Trust Circle technology...

By StorageNewsletter
Supply Chain Dependencies: Have You Checked Your Blind Spot?
NewsApr 16, 2026

Supply Chain Dependencies: Have You Checked Your Blind Spot?

Supply‑chain cyber risk is exploding, with third‑party breaches now accounting for 30% of incidents and costs soaring from $46 bn in 2023 to $60 bn in 2025, projected $138 bn by 2031. Yet ESET’s 2026 SMB Cyber Readiness Index shows only about 16%...

By WeLiveSecurity
Ukrainian Emergency Services and Hospitals Hit by Espionage Campaign Using New AgingFly Malware
NewsApr 16, 2026

Ukrainian Emergency Services and Hospitals Hit by Espionage Campaign Using New AgingFly Malware

Ukrainian hospitals, emergency services and municipal authorities have been hit by a coordinated espionage campaign using a new malware suite dubbed AgingFly. The attacks, attributed to the Russian‑linked APT28 group, began with phishing emails masquerading as humanitarian‑aid proposals and delivered...

By The Record by Recorded Future
Behind the Mythos Hype, Glasswing Has Just One Confirmed CVE
NewsApr 16, 2026

Behind the Mythos Hype, Glasswing Has Just One Confirmed CVE

Anthropic’s Project Glasswing, the gated access program behind its Mythos AI, has produced only one publicly attributed CVE (CVE‑2026‑4747) according to VulnCheck’s analysis. While Anthropic researchers are credited with 40 CVEs overall, the majority stem from external collaborations rather than...

By CSO Online