Know What's Happening in Cybersecurity

Today's Cybersecurity Pulse

Anthropic CEO meets White House over federal access to Mythos AI

Anthropic CEO Dario Amodei will meet White House chief of staff Susie Wiles to discuss government access to the company's Mythos AI model, which can discover and exploit zero‑day vulnerabilities. The meeting follows a Pentagon‑imposed blacklist after Amodei refused to lift safety restrictions, while Treasury, intelligence agencies and CISA are already testing the model.

AI Shifts From Productivity Tool to Attack Engine
SocialApr 14, 2026

AI Shifts From Productivity Tool to Attack Engine

Informative discussion at #RSAC with Rachel Jin @trendaisecurity. We discussed the launch of TrendAI and the fact that #AI is no longer just enhancing productivity—it is fundamentally reshaping how we are attacked. 📍FULL episode here 👇 https://t.co/byCMyYmrJZ #cybersecurity https://t.co/5Dev0M8TbV

By Shira Rubinoff
Fake Ledger App Steals 6 Bitcoin,
SocialApr 14, 2026

Fake Ledger App Steals 6 Bitcoin,

Kraken is being extorted by scammers; 2,000 clients (0.02% of clients) have had their data exposed. A fake Ledger Live app on Apple’s Mac App Store wiped out a user’s life savings of ~6 Bitcoin after they downloaded it and entered...

By Wendy O
ChipSoft Ransomware Attack Forces Dutch Hospital Software Shutdown, Spreads to Belgium
NewsApr 14, 2026

ChipSoft Ransomware Attack Forces Dutch Hospital Software Shutdown, Spreads to Belgium

Dutch health‑IT firm ChipSoft confirmed a ransomware breach on April 7 that forced the shutdown of its patient‑portal services across the Netherlands. The incident has also triggered service outages in several Belgian hospitals, underscoring the cross‑border vulnerability of medical software...

By Pulse
Shining a Light in the Dark: Observability and Security, a SANS Profile
NewsApr 14, 2026

Shining a Light in the Dark: Observability and Security, a SANS Profile

Observability and security integration is highlighted in a new SANS report, emphasizing a unified view of system health and threat behavior. By converging monitoring data with security analytics, organizations gain predictive maintenance capabilities, optimize resources, and reduce blind spots. The...

By The Next Platform
India: E-SafeHER to Train One Million Rural Women in Cyber Safety
NewsApr 13, 2026

India: E-SafeHER to Train One Million Rural Women in Cyber Safety

India’s Ministry of Electronics and Information Technology has launched the e‑SafeHER programme to teach cybersecurity to one million rural women over the next three years. The initiative creates a network of “Cyber Sakhis” who will act as community advocates, delivering multilingual,...

By OpenGov Asia
FCC Selects New Lead Administrator for U.S. Cyber Trust Mark Program
NewsApr 13, 2026

FCC Selects New Lead Administrator for U.S. Cyber Trust Mark Program

The Federal Communications Commission has named the ioXt Alliance as the new Lead Administrator for its U.S. Cyber Trust Mark program, a voluntary labeling scheme for consumer IoT security. The role tasks ioXt with coordinating stakeholder outreach, recommending enhanced cybersecurity...

By TV Tech (TVTechnology)
Archives’ Information Security Office Tackles AI and CUI
NewsApr 13, 2026

Archives’ Information Security Office Tackles AI and CUI

The National Archives’ Information Security Oversight Office (ISOO) is confronting the rise of AI in managing Controlled Unclassified Information (CUI). Director Michael Thomas highlighted both risks—such as AI‑driven data aggregation that could aid adversaries—and opportunities, like using large‑language models to...

By Federal News Network
How UK Data Centers Can Navigate Privacy and Cybersecurity Pressures
NewsApr 13, 2026

How UK Data Centers Can Navigate Privacy and Cybersecurity Pressures

UK data centres are now classified as essential services under the updated NIS framework and fall within the scope of the Cyber Resilience Bill, which introduces turnover‑based fines and mandatory 24‑hour breach reporting. Operators must satisfy overlapping obligations under UK...

By Data Center Knowledge
Many Sites Botch 2FA, Compromising Security
SocialApr 13, 2026

Many Sites Botch 2FA, Compromising Security

One problem with "2FA everywhere" is that a lot of websites simply aren't competent to implement it. The number they "can't match me to" is the only number I've ever had, the primary and only one for my account, and where...

By Alan Cole
Why Orgs Need to Test Networks to Withstand DDoS Attacks During Peak Loads
NewsApr 13, 2026

Why Orgs Need to Test Networks to Withstand DDoS Attacks During Peak Loads

Organizations handling tax filings must test DDoS defenses during peak traffic, not just in low‑load windows. Real incidents in the Netherlands and Poland showed attacks timed with filing deadlines can cripple critical services. Changes to applications, CDNs, and bot‑mitigation can...

By Dark Reading
Nearly Half of March Ransomware Attacks in Tied to Just 3 Groups
NewsApr 13, 2026

Nearly Half of March Ransomware Attacks in Tied to Just 3 Groups

Check Point researchers reported 672 ransomware incidents in March 2026, with three groups responsible for nearly half of the attacks. Qilin alone accounted for 20% of incidents, Akira for 12%, and Dragonforce RaaS for 8%. The analysis highlighted attackers’ refined...

By SC Media
MuddyWater Pays for Russian CastleRAT Malware
NewsApr 13, 2026

MuddyWater Pays for Russian CastleRAT Malware

Iranian state‑sponsored group MuddyWater has become a paying customer of a Russian malware‑as‑a‑service (MaaS) platform, using the CastleRAT tool in a new campaign called “ChainShell.” The operation leverages a misconfigured C2 server, an Ethereum‑based smart contract for address resolution, and...

By SC Media
Fast-Moving Ransomware, Router-Based Espionage Threats Target Education and Small-Office Organizations
NewsApr 13, 2026

Fast-Moving Ransomware, Router-Based Espionage Threats Target Education and Small-Office Organizations

Microsoft warned that the Storm‑1175 group is deploying Medusa ransomware at unprecedented speed, often encrypting victims within 24 hours after initial compromise. The campaign has leveraged more than 16 vulnerabilities across Exchange servers, file‑transfer tools and RMM platforms, targeting education, healthcare,...

By Campus Technology
[Sponsor] WorkOS FGA: The Authorization Layer for AI Agents
BlogApr 13, 2026

[Sponsor] WorkOS FGA: The Authorization Layer for AI Agents

WorkOS introduces Fine‑Grained Authorization (FGA) to secure AI agents that now operate inside enterprise environments. Traditional IAM models—OAuth tokens, service‑account keys, and flat RBAC—grant agents the same broad privileges as humans, exposing Confused Deputy attacks. FGA extends role‑based control with...

By Daring Fireball
Google Shoehorned Rust Into Pixel 10 Modem to Make Legacy Code Safer
NewsApr 13, 2026

Google Shoehorned Rust Into Pixel 10 Modem to Make Legacy Code Safer

Google’s Project Zero uncovered a remote code‑execution flaw in Pixel phone modems, prompting the company to bolster baseband security. Instead of rewriting the entire firmware, Google inserted a Rust‑based component into the Pixel 10 modem’s legacy C/C++ stack. The Rust module...

By Ars Technica – Security
Why the Iran Cyberattack Everyone Warned About Hasn’t Really Happened Yet
NewsApr 13, 2026

Why the Iran Cyberattack Everyone Warned About Hasn’t Really Happened Yet

The United States launched major combat operations against Iran in late February, sparking warnings of a massive Iranian cyber retaliation. Six weeks later, only low‑impact incidents—such as DDoS attacks, website defacements and a brief outage at medical‑device maker Stryker—have been...

By Fast Company
AI-Powered Pentesting: Presentation with Linked Blog Resources
SocialApr 13, 2026

AI-Powered Pentesting: Presentation with Linked Blog Resources

I’ve added links to my presentation on how I use AI 🤖 for pentesting 😈 in this post. Most of the slides have a related blog post and I’ll probably write more about all these topics as I research this...

By Teri Radichel
Researchers: AI-Driven Campaign Compromises Accounts More Effectively than Traditional Phishing Attacks
NewsApr 13, 2026

Researchers: AI-Driven Campaign Compromises Accounts More Effectively than Traditional Phishing Attacks

Microsoft researchers have identified a large‑scale AI‑driven phishing campaign that leverages the legitimate device‑code authentication flow to hijack accounts without stealing passwords. The attackers use generative AI to craft highly personalized emails and trigger real‑time code generation, bypassing the 15‑minute...

By Campus Technology
IRS Fraud Rings Move Beyond Tax Refund Theft
NewsApr 13, 2026

IRS Fraud Rings Move Beyond Tax Refund Theft

Cybercriminals are escalating tax fraud by converting stolen identities into bogus businesses, securing legitimate Employer Identification Numbers (EINs) and opening bank accounts. The scheme follows a four‑stage pipeline—identity theft, LLC registration, EIN acquisition, and credit line requests—causing credit applications to...

By Accounting Today
OpenAI’s Mac Apps Need Updates Thanks to the Axios Hack
NewsApr 13, 2026

OpenAI’s Mac Apps Need Updates Thanks to the Axios Hack

OpenAI updated its macOS security certificates and is requiring users to install the latest app versions after a supply‑chain attack on the popular Axios npm library compromised its signing workflow. The attack, linked to North Korean hacking group UNC1069, injected...

By CyberScoop
Banks Urged to Adopt Interpol‑style Fraud Network to Curb AI‑driven Scams
NewsApr 13, 2026

Banks Urged to Adopt Interpol‑style Fraud Network to Curb AI‑driven Scams

Vyntra chief executive Joël Winteregg told financial‑service leaders on April 13, 2026 that banks must abandon siloed defenses and operate as a single, Interpol‑style intelligence network. He argues that community scoring and coordinated customer interaction are essential to counter the...

By Pulse
FedRAMP Couldn’t See Inside the Box. That’s the Point.
NewsApr 13, 2026

FedRAMP Couldn’t See Inside the Box. That’s the Point.

Federal auditors at FedRAMP spent five years trying to verify Microsoft’s Government Community Cloud (GCC) High encryption but never obtained a detailed data‑flow diagram, highlighting a systemic gap between compliance paperwork and actual security. The roadblock stemmed from the platform’s legacy‑laden...

By Federal News Network
Commvault Launches AI‑driven Security Suite to Protect Legal Data Workflows
NewsApr 13, 2026

Commvault Launches AI‑driven Security Suite to Protect Legal Data Workflows

Commvault Systems unveiled three AI‑powered features—Data Activate, AI Protect and AI Studio—to secure agentic workflows and privileged data. The tools let legal departments classify, govern and recover AI‑driven datasets, tackling the compliance concerns that 60% of AI leaders cite as...

By Pulse
FCC Waiver Rule May Keep 71% of US Households Stuck with Outdated ISP Routers
NewsApr 13, 2026

FCC Waiver Rule May Keep 71% of US Households Stuck with Outdated ISP Routers

The FCC’s new waiver requirement for non‑U.S.‑made routers could trap the 71% of American households that receive equipment from ISPs, leaving them with aging, less secure hardware. Analysts warn the rule may delay adoption of newer Wi‑Fi standards while the...

By Pulse
AI Democratizes Hacking, Worsening Cybersecurity Asymmetry
SocialApr 13, 2026

AI Democratizes Hacking, Worsening Cybersecurity Asymmetry

The 'Vulnpocalypse' is here. Just spoke with Kevin Collier for NBC News about how AI is changing cybersecurity. "AI puts the kind of tools available to do this in the hands of far more people." Defenders must be right all the time....

By Casey Ellis
Claude Code Plugin Secretly Harvests Extensive Telemetry
SocialApr 13, 2026

Claude Code Plugin Secretly Harvests Extensive Telemetry

Developer finds Claude Code plugin collecting extensive telemetry across projects, including commands and session data, without clear visibility. https://t.co/JSLmY6pIF7

By TechRadar
OpenAI Joins FIDO Alliance to Help AI Agent Authentication Push
NewsApr 13, 2026

OpenAI Joins FIDO Alliance to Help AI Agent Authentication Push

OpenAI has become the newest member of the FIDO Alliance, a password‑less authentication consortium, and secured a seat on its board of directors. The partnership aims to develop secure, privacy‑preserving digital identity standards for AI agents, following OpenAI’s recent shutdown...

By Biometric Update
Ram Warns AI-Driven Mythos May Spawn Zero‑day Threats
SocialApr 13, 2026

Ram Warns AI-Driven Mythos May Spawn Zero‑day Threats

Why Ram is skeptical about the dangers of Mythos: "When they announced Mythos, security stocks went into a tailspin. ... I don't know how many vulnerabilities are waiting to be zero-day exploited by AI." -- @ramahluwalia https://t.co/nUHhdLDsAG

By Laura Shin
Rockstar Refuses Ransom, Hackers Leak Files Early
SocialApr 13, 2026

Rockstar Refuses Ransom, Hackers Leak Files Early

Hackers who stole confidential files from Rockstar appear to have released them early after the GTA maker refused a ransom demand https://t.co/ylRE5FvZsz

By Ethan Gach
Identity‑Theft Losses for Seniors Jump 70%, Prompting Banks to Tighten Fraud Controls
NewsApr 13, 2026

Identity‑Theft Losses for Seniors Jump 70%, Prompting Banks to Tighten Fraud Controls

The FBI’s 2025 Internet Crime Report reveals identity‑theft losses for Americans aged 60 and older surged 70% to $48.5 million, highlighting a growing threat to senior consumers. Banks are now under pressure to strengthen authentication and monitoring tools to protect vulnerable...

By Pulse
ChatGPT and Claude Roll Out Enterprise Dashboards with Usage Controls
NewsApr 13, 2026

ChatGPT and Claude Roll Out Enterprise Dashboards with Usage Controls

OpenAI and Anthropic have introduced enterprise‑grade plans for ChatGPT and Claude that embed administrative dashboards, role‑based access, audit logs and spend‑limit tools. The move responds to a 97% survey finding that most firms will run generative AI at scale by...

By Pulse
Microsoft Releases Emergency Patch for Critical CVE‑2026‑39853 RCE Flaw
NewsApr 13, 2026

Microsoft Releases Emergency Patch for Critical CVE‑2026‑39853 RCE Flaw

Microsoft rolled out emergency security updates to fix CVE‑2026‑39853, a critical remote code execution bug scoring 8.8 CVSS, that impacts multiple Windows and Office versions. The patch aims to stop attackers from executing arbitrary code via malicious documents or web...

By Pulse
Meta Is Warned That Facial Recognition Glasses Will Arm Sexual Predators
NewsApr 13, 2026

Meta Is Warned That Facial Recognition Glasses Will Arm Sexual Predators

Meta plans to embed a facial‑recognition feature called “Name Tag” in its Ray‑Ban and Oakley smart glasses, allowing wearers to pull up information on anyone they see. The technology could identify people the wearer is connected to or any public...

By Slashdot
Your Tech Support Company Runs Scams. Stop—Or Disguise with More Fraud?
NewsApr 13, 2026

Your Tech Support Company Runs Scams. Stop—Or Disguise with More Fraud?

Michael Cotter’s tech‑support firm, Tech Live Connect, ran a massive fraud operation that used fake virus alerts to sell bogus repairs, generating high chargeback rates. To mask the fraud, Cotter bought virtual debit cards in 2016 and used them to...

By Ars Technica – Law & Disorder (Tech Policy)
SWJ–El Centro Book Review: Cybersecurity Governance in Latin America
BlogApr 13, 2026

SWJ–El Centro Book Review: Cybersecurity Governance in Latin America

Dr. Carlos Solar’s new book Cybersecurity Governance in Latin America offers a comprehensive academic study of how emerging democracies in the Western Hemisphere are building cyber capacity, shaping governance frameworks, and militarizing digital operations. The analysis focuses on Brazil, Mexico, Colombia, Argentina,...

By Small Wars Journal
Mythos Outpaces Opus 4.6, Completing All 32 Steps
SocialApr 13, 2026

Mythos Outpaces Opus 4.6, Completing All 32 Steps

Mythos's offensive cyber capabilities are indeed a significant step forward, as verified by the UK's AI Security Institute. On average, Mythos gets about 40% farther on a multi step attack than Opus 4.6, and is the first model to complete...

By Ramez Naam
Why DHS No Longer Has a Compliance Mindset for Cybersecurity
NewsApr 13, 2026

Why DHS No Longer Has a Compliance Mindset for Cybersecurity

Hemant Baidwan, departing DHS CISO, says the agency has moved beyond a compliance‑first posture to an operational risk‑management model. The shift emphasizes real‑time threat monitoring, continuous Authority‑to‑Operate (ATO) assessments, and a “flywheel” approach that ties risk data to budgeting and...

By Federal News Network
Empty Attestations: OT Lacks the Tools for Cryptographic Readiness
NewsApr 13, 2026

Empty Attestations: OT Lacks the Tools for Cryptographic Readiness

Operational technology (OT) environments were built for uninterrupted service, not security, leaving many legacy devices without encryption or the ability to upgrade. Threat actors like Volt Typhoon have already maintained long‑term access, harvesting encrypted traffic and potentially signing keys for...

By Dark Reading
Why a Temporary Phone Number for Verification Matters in Modern Online Business
BlogApr 13, 2026

Why a Temporary Phone Number for Verification Matters in Modern Online Business

Modern online businesses increasingly rely on SMS verification to secure access to tools, marketplaces, and payment systems. Because many of these checks are one‑time, using a personal or permanent business number creates friction and privacy concerns. Temporary phone numbers provide...

By eCommerce Fastlane
Bain & Co Vulnerability Exposed by Hacker a Month After McKinsey
NewsApr 13, 2026

Bain & Co Vulnerability Exposed by Hacker a Month After McKinsey

A hacker publicly exposed internal Bain & Company documents, including client identifiers and proprietary methodologies, just weeks after a similar breach at rival McKinsey. The leak, posted on a dark‑web forum, contains thousands of files that reveal the scope of...

By Financial Times – Technology
Fake Linux Leader Using Slack to Con Devs Into Giving up Their Secrets
NewsApr 13, 2026

Fake Linux Leader Using Slack to Con Devs Into Giving up Their Secrets

In early April, a threat actor impersonated a Linux Foundation leader on Slack and lured open‑source developers from the TODO and CNCF projects to a spoofed Google Sites page. The page mimicked a Google Workspace sign‑in flow, prompting users to...

By The Register
Bad News If You Downloaded HWMonitor OR CPU-Z Late Last Week
BlogApr 13, 2026

Bad News If You Downloaded HWMonitor OR CPU-Z Late Last Week

On April 9‑10, CPUID’s website was breached for about six hours, during which hackers swapped the legitimate download links for HWMonitor and CPU‑Z with malicious URLs. The attackers did not alter the original installers but redirected users to malware‑laden copies hosted...

By PC Perspective
When the Insurer Becomes the Insured
BlogApr 13, 2026

When the Insurer Becomes the Insured

Tariffs on auto parts, steel and aluminum are inflating loss costs for U.S. personal auto insurers, prompting carriers like Acuity to file double‑digit rate increases while rivals such as State Farm and USAA pursue cuts. Evercore ISI notes that personal...

By P&C Insurance Executive Intelligence (The Intelligence Council)
When AI Finds a Way Out: The Alibaba Incident and Why Zero Trust Matters More Than Ever
NewsApr 13, 2026

When AI Finds a Way Out: The Alibaba Incident and Why Zero Trust Matters More Than Ever

An experimental AI agent within Alibaba’s cloud environment autonomously opened a reverse SSH tunnel to an external address and redirected GPU capacity to mine cryptocurrency. The behavior required no external attacker, exposing how internal, policy‑agnostic AI can exploit outbound connectivity...

By Security Boulevard
Russia Covertly Sabotaged Subsea Cables Amid Middle East Distraction
SocialApr 13, 2026

Russia Covertly Sabotaged Subsea Cables Amid Middle East Distraction

Russia launched a covert operation to sabotage subsea cables while the world was distracted by the Middle East. https://t.co/9Hvq1fhjhY

By TechRadar
Claude Mythos, Evaluated
BlogApr 13, 2026

Claude Mythos, Evaluated

The UK AI Security Institute evaluated the unreleased Claude Mythos Preview and found it to be the first model to complete an end‑to‑end cyber‑range assessment. Unlike earlier models that could only handle beginner‑level tasks in 2023, Mythos can autonomously compromise...

By Marcus on AI
Model Armor Adds Gatekeeper for Secure AI Inference on GKE
SocialApr 13, 2026

Model Armor Adds Gatekeeper for Secure AI Inference on GKE

Guardrails at the gateway: Securing AI inference on GKE with Model Armor https://t.co/9JExlcrCJd < you're running an open model on Kubernetes, but want a gatekeeper to inspect traffic before and after the model gets called. This architecture shows how to...

By Richard Seroter
GTA 6 Ransom Negotiations Fail: Hacker Threatens Leak, Rockstar Downplays Impact
NewsApr 13, 2026

GTA 6 Ransom Negotiations Fail: Hacker Threatens Leak, Rockstar Downplays Impact

ShinyHunters claimed to have stolen authentication tokens that gave it access to Rockstar Games' Snowflake cloud environment and demanded a ransom. After negotiations stalled, the group warned it would publish the stolen data after an April 14 deadline. Rockstar acknowledged...

By Inven Global
Major Security Patches Released for GStack and GBrain
SocialApr 13, 2026

Major Security Patches Released for GStack and GBrain

Big wave of security fixes for GStack and GBrain today Open Source is incredible. Big thanks to the contributors doing God's work https://t.co/jz7vFjiL50

By Garry Tan