Know What's Happening in Cybersecurity

Today's Cybersecurity Pulse

Anthropic CEO meets White House over federal access to Mythos AI

Anthropic CEO Dario Amodei will meet White House chief of staff Susie Wiles to discuss government access to the company's Mythos AI model, which can discover and exploit zero‑day vulnerabilities. The meeting follows a Pentagon‑imposed blacklist after Amodei refused to lift safety restrictions, while Treasury, intelligence agencies and CISA are already testing the model.

How the Explosion in Machine Identities Is Changing Cyber Defense
NewsApr 13, 2026

How the Explosion in Machine Identities Is Changing Cyber Defense

Machine identities—API keys, service accounts, certificates—now outnumber human accounts by over 100 to 1, with some sectors hitting 500 to 1, according to Obsidian Security. Fifty percent of enterprises reported breaches linked to compromised machine credentials in the past year, while only 12 % have...

By ITPro
FBI Classifies Suspected Chinese Breach of Wiretap Surveillance System as ‘Major Incident’
BlogApr 13, 2026

FBI Classifies Suspected Chinese Breach of Wiretap Surveillance System as ‘Major Incident’

The FBI announced that a suspected Chinese state‑sponsored intrusion compromised its Digital Collection System Network (DCSNet), the internal platform that manages pen‑register and trap‑and‑trace wiretap data. The breach, achieved through a commercial ISP vendor, was classified as a “major incident”...

By Legal Tech Daily
AWS Security Digest #256 - TY Mythos
BlogApr 13, 2026

AWS Security Digest #256 - TY Mythos

AWS inadvertently pushed a test IAM managed policy into production, a slip caught by IAM Trail. The incident coincides with the first Mythos‑reported vulnerability appearing in AWS security bulletin 2026‑015, highlighting AI‑driven code‑scanning efforts under Project Glasswing. Research disclosed critical flaws in...

By AWS Security Digest
Scammers Pose as Kickstarter on Publishing Platforms—Stay Vigilant
SocialApr 13, 2026

Scammers Pose as Kickstarter on Publishing Platforms—Stay Vigilant

Now publishing scammers are posing as people at Kickstarter? What is next. It came from an obvious fake Gmail address. Writer friends, please be careful.

By Eric Smith
Adobe Finally Patches PDF Pest After Months of Abuse
NewsApr 13, 2026

Adobe Finally Patches PDF Pest After Months of Abuse

Adobe released a patch on April 11 for CVE‑2026‑34621, a critical zero‑day in Acrobat and Reader that allowed arbitrary code execution on Windows and macOS. The flaw was actively exploited for months, using heavily obfuscated JavaScript to profile victims and deliver...

By The Register
‘Grand Theft Auto’ Publisher Rockstar Hit by Hackers Again
NewsApr 13, 2026

‘Grand Theft Auto’ Publisher Rockstar Hit by Hackers Again

Rockstar Games suffered a second breach when the ShinyHunters gang used stolen authentication tokens to masquerade as a legitimate user of the AI analytics platform Anodot and infiltrate the company’s Snowflake data warehouse. The attackers accessed a limited set of...

By ComputerWeekly
Seven IBM WebSphere Liberty Flaws Can Be Chained Into Full Takeover
NewsApr 13, 2026

Seven IBM WebSphere Liberty Flaws Can Be Chained Into Full Takeover

Security researchers disclosed seven interrelated flaws in IBM WebSphere Liberty, a modular Java application server, that can be chained to achieve full server takeover. The chain begins with a pre‑authentication remote code execution (RCE) vulnerability in the SAML Web SSO...

By CSO Online
Your MTTD Looks Great. Your Post-Alert Gap Doesn't
NewsApr 13, 2026

Your MTTD Looks Great. Your Post-Alert Gap Doesn't

The security industry has narrowed mean‑time‑to‑detect (MTTD) but still suffers a lengthy post‑alert gap, where analysts spend 20‑40 minutes investigating alerts. Recent AI‑driven exploits, such as Anthropic’s Mythos model, demonstrate that attackers can move in seconds, making human‑speed investigations untenable....

By The Hacker News
New Industry Resource Announced by DSA: Best Practice Guidelines for ID Documents
NewsApr 13, 2026

New Industry Resource Announced by DSA: Best Practice Guidelines for ID Documents

The Document Security Alliance, together with INTERGRAF and the Secure Identity Alliance, released the Minimum Security Standards for Identity Documents, a best‑practice guide for state issuers. The guidelines address integration of physical security features with embedded digital elements and aim...

By Identity Week
Why DHS No Longer Has a Compliance Mindset for Cybersecurity
PodcastApr 13, 202639 min

Why DHS No Longer Has a Compliance Mindset for Cybersecurity

In this episode of Ask the CIO, former DHS Chief Information Security Officer Hemant Badewin discusses his 15‑year federal career, why he chose to leave at this pivotal moment, and his new role as Executive CISO at Knox Systems. He...

By Ask the CIO (Apple listing)
Managing Cyber Risks in the Era of Decentralized Energy
NewsApr 13, 2026

Managing Cyber Risks in the Era of Decentralized Energy

The U.S. electric grid is rapidly integrating distributed energy resources (DERs) such as rooftop solar, storage and vehicle‑to‑grid systems, creating a more resilient but digitally complex network. This shift has expanded the attack surface, with utility cyber‑attacks up 75% from...

By PV Magazine USA
Booking.com Warns Customers Their Private Travel Details May Have Been Accessed by ‘Unauthorised Party’
NewsApr 13, 2026

Booking.com Warns Customers Their Private Travel Details May Have Been Accessed by ‘Unauthorised Party’

Booking.com has warned that an unauthorized third party may have accessed customers' personal travel information. The breach notification was sent to a subset of Australian users, indicating that names, booking details and itineraries could be exposed. The company said it...

By DataBreaches.net
GTA-Maker Rockstar Games Hacked Again but Downplays Impact
NewsApr 13, 2026

GTA-Maker Rockstar Games Hacked Again but Downplays Impact

Rockstar Games, the studio behind Grand Theft Auto, suffered a second cyber intrusion within three years, as disclosed by cybersecurity outlets on Saturday. A hacker collective claimed responsibility, posting details of the breach online. Rockstar publicly downplayed the incident, stating...

By DataBreaches.net
MN: Spring Lake Park Schools Closed After Suspected Ransomware Attack
NewsApr 13, 2026

MN: Spring Lake Park Schools Closed After Suspected Ransomware Attack

Spring Lake Park School District in Minnesota shut all campuses on Monday after a suspected ransomware attack crippled its computer systems. The intrusion forced the district to suspend classes and administrative operations as a precaution while local law enforcement and...

By DataBreaches.net
LG Uplus Gets Physical on USIM Security Update
NewsApr 13, 2026

LG Uplus Gets Physical on USIM Security Update

LG Uplus has launched a free USIM replacement programme to fix a weakness in IMSI number security. The rollout began on 8 April and has already attracted at least 157,811 customers who booked store visits for the swap, with extra staff...

By Mobile World Live
Google Makes It Harder to Exploit Pixel 10 Modem Firmware
NewsApr 13, 2026

Google Makes It Harder to Exploit Pixel 10 Modem Firmware

Google has bolstered the security of its Pixel 10 smartphones by embedding a Rust‑based DNS parser into the cellular baseband modem firmware. The new component, derived from the open‑source hickory‑proto library, replaces legacy C code and adds roughly 371 KB to the...

By Help Net Security
N‑able Makes UEM AI-Native with MCP Server Launch
NewsApr 13, 2026

N‑able Makes UEM AI-Native with MCP Server Launch

N-able unveiled its Model Context Protocol (MCP) server, a secure bridge that connects everyday AI tools directly to live data within its Unified Endpoint Management (UEM) platforms, N‑central and N‑sight. Alongside the server, the company introduced N‑zo, an in‑product AI...

By Business Wire — Executive Appointments
Command Line: Mythos Burnout and the Boardroom
NewsApr 13, 2026

Command Line: Mythos Burnout and the Boardroom

Anthropic’s Mythos large‑language model is prompting boardroom alarm as AI‑accelerated vulnerability discovery threatens to flood enterprises with exploitable findings. A new “Getting Mythos Ready” paper, authored by top CISOs, urges layered defenses—segmentation, canaries, honey tokens, and automated response playbooks—to contain...

By The Stack (TheStack.technology)
The Dumbest Hack of the Year Exposed a Very Real Problem
NewsApr 13, 2026

The Dumbest Hack of the Year Exposed a Very Real Problem

In April 2026 a hacker hijacked Bluetooth‑enabled crosswalk buttons in multiple U.S. cities, uploading spoofed recordings of tech CEOs by exploiting the default password "1234" used by Polara devices. The breach affected intersections in Menlo Park, Redwood City, Palo Alto, Seattle and Denver,...

By WIRED (Security)
Alleged German DDoS-for-Hire Kingpin Behind Fluxstress Caught in Thailand
NewsApr 13, 2026

Alleged German DDoS-for-Hire Kingpin Behind Fluxstress Caught in Thailand

German national Noah Christopher, alleged operator of the Fluxstress and Neldowner DDoS‑for‑Hire services, was arrested in Bangkok last week. The 27‑year‑old had been evading capture by moving between Dubai, China and Thailand after a multi‑year probe by German and EU...

By HackRead
Siemens Expands Industrial Automation DataCenter with Edge AI and Cybersecurity
NewsApr 13, 2026

Siemens Expands Industrial Automation DataCenter with Edge AI and Cybersecurity

Siemens announced an upgraded Industrial Automation DataCenter that ships as a pre‑installed, AI‑ready turnkey solution for production environments. The platform combines NVIDIA GPUs and BlueField DPUs for edge AI acceleration with Palo Alto Networks Prisma AIRS delivering zero‑trust security. By integrating...

By Help Net Security
Rockstar Games Confirms Third‑Party Data Breach, Says No Player Impact
NewsApr 13, 2026

Rockstar Games Confirms Third‑Party Data Breach, Says No Player Impact

Rockstar Games confirmed that a breach through third‑party analytics provider Anodot exposed a limited set of non‑material corporate information, but assured there is no impact on its organization or players. Hackers ShinyHunters have set an April 14 deadline to demand...

By Pulse
VENOM Phishing Kit Hijacks Microsoft 365 Credentials of CEOs and CFOs
NewsApr 13, 2026

VENOM Phishing Kit Hijacks Microsoft 365 Credentials of CEOs and CFOs

A newly documented phishing platform called VENOM is targeting CEOs, CFOs and other senior executives to steal Microsoft 365 credentials and session tokens, even when multi‑factor authentication is enabled. The service uses tailored emails, Unicode QR codes and real‑time adversary‑in‑the‑middle...

By Pulse
Fake Claude Website Distributes PlugX RAT
NewsApr 13, 2026

Fake Claude Website Distributes PlugX RAT

Security researchers discovered a counterfeit Anthropic Claude website that offered a fake "pro" version of the LLM, but the download actually installed a trojanized MSI. The installer runs a VBScript dropper that places a signed G DATA updater in the startup...

By SecurityWeek
How Claude Mythos Preview Found Thousands of Zero-Day Vulnerabilities and Why the Health Tech Sector’s Absence From Project Glasswing Should...
BlogApr 13, 2026

How Claude Mythos Preview Found Thousands of Zero-Day Vulnerabilities and Why the Health Tech Sector’s Absence From Project Glasswing Should...

On April 7, 2026 Anthropic unveiled Claude Mythos Preview, an AI model that autonomously discovered thousands of zero‑day vulnerabilities across major operating systems and browsers. The company kept the model private and launched Project Glasswing, a defensive coalition of 40+...

By Thoughts on Healthcare Markets & Tech
Seized VerifTools Servers Expose 915,655 Fake IDs, 8 Arrested
NewsApr 13, 2026

Seized VerifTools Servers Expose 915,655 Fake IDs, 8 Arrested

Dutch police, in coordination with the FBI, arrested eight men aged 20‑34 after seizing VerifTools servers that had produced 915,655 counterfeit identity documents. The investigation uncovered 5,169 fake Dutch IDs and 236,002 U.S.-linked documents sold for roughly $1.47 million. VerifTools generated...

By Help Net Security
OpenAI API Keys Widely Exposed Across GitHub Repositories
SocialApr 13, 2026

OpenAI API Keys Widely Exposed Across GitHub Repositories

Seriously we gotta be grateful to vibe coders. You can literally search OPENAI_API_KEY on GitHub and find an endless supply of exposed credentials 🙏 https://t.co/1DBLMIUhyk

By Data Chaz
CISOs Tackle the AI Visibility Gap
NewsApr 13, 2026

CISOs Tackle the AI Visibility Gap

CISOs are confronting a growing AI visibility gap as organizations race to deploy generative models and AI‑enabled tools. A Pentera 2026 survey shows 67% of security leaders lack clear insight into where AI runs, and 48% cite limited visibility as...

By CSO Online
Hackers Minted and Sold 1 Billion DOT on Ethereum
SocialApr 13, 2026

Hackers Minted and Sold 1 Billion DOT on Ethereum

Hackers minted 1 billion $DOT tokens on the Ethereum mainnet and then successfully sold them, according to CertiK. https://t.co/bbEO4FEH38

By Crypto Jack
Iran-Linked Group Handala Claims to Have Breached Three Major UAE Organizations
BlogApr 13, 2026

Iran-Linked Group Handala Claims to Have Breached Three Major UAE Organizations

Handala, an Iran‑linked hacktivist group believed to be a front for Void Manticore, claimed a massive cyberattack on three UAE agencies—Dubai Courts, Dubai Land Department, and Dubai Roads & Transport Authority. The group alleges it destroyed six petabytes of data...

By Security Affairs
Why Securing GenAI Use Starts in the Browser
NewsApr 13, 2026

Why Securing GenAI Use Starts in the Browser

Enterprise adoption of generative AI has exploded, with daily usage rising nearly 60% in a year and weekly use tripling over two years. Employees now spend more than 80% of their workday in browsers, turning the browser into the primary...

By CIO Dive
We Catch up on the News, Including AI Vuln Hunting; Also More RSAC Interviews! - Mark Lambert, Samuel Hassine, John...
NewsApr 13, 2026

We Catch up on the News, Including AI Vuln Hunting; Also More RSAC Interviews! - Mark Lambert, Samuel Hassine, John...

ArmorCode unveiled its AI Exposure Management (AIEM) solution on the Agentic AI Platform, giving enterprises real‑time visibility into AI usage, ownership, and risk across heterogeneous environments. The launch coincides with the release of the 2026 State of AI Risk Management...

By SC Media
ETSI’s Response to the European Commission’s Proposal for the Cybersecurity Act 2
NewsApr 13, 2026

ETSI’s Response to the European Commission’s Proposal for the Cybersecurity Act 2

On 15 April 2026 ETSI issued a formal position paper responding to the European Commission’s proposal for the Cybersecurity Act 2. The standards body endorses a risk‑based, tiered certification framework, calls for transparent governance and stakeholder input, and stresses the need...

By ETSI — Newsroom
Adobe Confirms Exploitation: Malware Uses Undocumented API
NewsApr 13, 2026

Adobe Confirms Exploitation: Malware Uses Undocumented API

Adobe has confirmed active exploitation of the critical CVE‑2026‑34621 vulnerability in Acrobat and Reader on Windows and macOS. The flaw grants attackers arbitrary code execution when a user opens a crafted PDF. Exploit code abuses an undocumented API, SilentDocCenterLogin(), and...

By The Stack (TheStack.technology)
Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621
NewsApr 13, 2026

Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621

Adobe released emergency updates to fix a high‑impact Acrobat and Reader flaw identified as CVE‑2026‑34621. The vulnerability, rated 8.6 on the CVSS scale, allows arbitrary code execution via prototype pollution and has been confirmed exploited in the wild. Affected products...

By The Cyber Express
Accenture and Google Cloud Unveil Brussels Centre to Accelerate Sovereign AI Adoption
NewsApr 13, 2026

Accenture and Google Cloud Unveil Brussels Centre to Accelerate Sovereign AI Adoption

Accenture and Google Cloud have launched a Sovereign Centre in Brussels, featuring a dedicated training facility and an air‑gapped environment for secure AI and cloud experimentation. The centre combines Accenture’s industry and AI expertise with Google Distributed Cloud’s air‑gapped technology...

By Tech.eu – People
Cyber Threats for PV: What Are Man-in-the-Middle Attacks and How Do They Work
NewsApr 13, 2026

Cyber Threats for PV: What Are Man-in-the-Middle Attacks and How Do They Work

Man‑in‑the‑middle (MITM) attacks are emerging as a critical cyber threat to network‑connected photovoltaic (PV) plants, allowing adversaries to intercept, modify, or block communications between controllers, inverters and monitoring systems. Such attacks can cause operational failures, physical damage to equipment, and...

By pv magazine
Europe Is Dismantling Its Own Rulebook to Compete with America
NewsApr 13, 2026

Europe Is Dismantling Its Own Rulebook to Compete with America

On 19 November 2025 the European Commission unveiled a Digital Omnibus package that amends the AI Act, GDPR, ePrivacy Directive, Data Act and several cybersecurity rules. The proposal delays high‑risk AI obligations by up to 16 months, adds a GDPR “legitimate‑interest” basis for...

By The Next Web (TNW)
OpenBSD Installs with All Services, Even SSH, Disabled
SocialApr 13, 2026

OpenBSD Installs with All Services, Even SSH, Disabled

When you install OpenBSD for the first time and everything is disabled by default (including SSH). 😅

By Gustavo Pezzi (Pikuma)
CPUID Watering Hole Attack Spreads STX RAT Malware
BlogApr 13, 2026

CPUID Watering Hole Attack Spreads STX RAT Malware

Threat actors compromised the CPUID website between April 9‑10, 2026, swapping legitimate CPU‑Z and HWMonitor download links with malicious installers for roughly six hours. The trojanized files contained a malicious DLL that used DLL sideloading to deliver the STX remote‑access trojan,...

By Security Affairs
Check Point Launches WA PoP for Workplace Security SASE
NewsApr 13, 2026

Check Point Launches WA PoP for Workplace Security SASE

Check Point Software Technologies has opened a Western Australia point of presence (PoP) for its Workplace Security SASE platform, delivering local data residency and compliance with WA‑specific legislation. The Perth PoP joins existing sites in Sydney, Melbourne and Auckland and...

By ARN (Australia)
India Unveils New Security Standards for Its Digital Payments System to Drive Global Adoption
NewsApr 13, 2026

India Unveils New Security Standards for Its Digital Payments System to Drive Global Adoption

India’s Bureau of Indian Standards (BIS) has rolled out new security norms covering biometric authentication, QR‑code payments, and digital‑currency handling. The guidelines aim to curb fraud, improve interoperability, and build consumer confidence in the country’s fast‑growing fintech ecosystem. BIS consulted...

By Mint (India) – Economy
A Legal Imperative for Strengthening Data Governance, Protecting Personal Information
NewsApr 13, 2026

A Legal Imperative for Strengthening Data Governance, Protecting Personal Information

South African companies face mounting pressure from the Protection of Personal Information Act (POPIA) to tighten data governance as digital transformation creates fragmented record‑keeping environments. Mohammed Vachiat of Konica Minolta South Africa argues that integrating digital record systems is now...

By ITWeb (South Africa) – Public Sector
Fixing Vulnerability Data Quality Requires Fixing the Architecture First
NewsApr 13, 2026

Fixing Vulnerability Data Quality Requires Fixing the Architecture First

Art Manion of Tharros argues that vulnerability data quality is fundamentally an architecture issue, not merely a metrics problem. He introduces the concept of Minimum Viable Vulnerability Enumeration (MVVE) and finds no single set of assertions can guarantee cross‑repository consistency....

By Help Net Security
Token Is All You Need: Finding 0days with LLMs and Agentic AI
BlogApr 13, 2026

Token Is All You Need: Finding 0days with LLMs and Agentic AI

The blog details how large language models (LLMs) have transformed zero‑day discovery from a niche skill into a scalable service. By using the "Carlini Loop"—a file‑by‑file prompting technique—Anthropic, OpenAI and open‑source projects have uncovered hundreds of high‑severity bugs in heavily...

By Agentic AI
Ground Control & VIAVI Partner to Secure Maritime Navigation Against GNSS Jamming
NewsApr 13, 2026

Ground Control & VIAVI Partner to Secure Maritime Navigation Against GNSS Jamming

VIAVI Solutions and Ground Control have teamed up to embed VIAVI’s Secure µPNT STL‑1000 receiver into the RockFLEET Assured maritime tracking platform. The software‑defined, low‑power unit leverages SecureTime altGNSS LEO services to provide a trusted secondary source of positioning, navigation and...

By Unmanned Systems Technology – News
ZeroID: Open-Source Identity Platform for Autonomous AI Agents
NewsApr 13, 2026

ZeroID: Open-Source Identity Platform for Autonomous AI Agents

ZeroID is an open‑source identity platform that adds a credentialing layer for autonomous AI agents and multi‑agent systems. It uses RFC 8693 token exchange to create verifiable delegation chains, automatically attenuating scopes as tasks cascade. The platform supports real‑time revocation through...

By Help Net Security
CESNET, Ribbon Achieve PoC in Quantum-Secured Optical Networking
BlogApr 13, 2026

CESNET, Ribbon Achieve PoC in Quantum-Secured Optical Networking

Ribbon Communications announced the successful completion of a quantum key distribution (QKD) proof‑of‑concept with CESNET, the Czech Republic’s national academic network. The test used Ribbon’s Apollo optical platform to deliver Layer‑1 encryption with virtually zero latency, proving quantum‑secured transmission can...

By TelecomDrive
Best MDM Solutions for 2026: 9 Tools Worth Considering
NewsApr 13, 2026

Best MDM Solutions for 2026: 9 Tools Worth Considering

Enterprises now juggle over 10,000 endpoints, with mobile devices comprising about 60% of the fleet, according to IDC. A new G2‑based evaluation of 20+ MDM platforms highlights nine solutions that excel in policy deployment, security enforcement, and remote lock‑down capabilities....

By G2 Learn