Know What's Happening in Cybersecurity

Today's Cybersecurity Pulse

Microsoft releases record‑size Patch Tuesday for April

The April update cycle delivered 165 patches addressing roughly 340 unique CVEs, including two zero‑day flaws, one of which is already being exploited in the wild. Microsoft urges immediate deployment across all product families.

Tools Are Easy; Business‑focused Risk Understanding Is Hard
SocialApr 17, 2026

Tools Are Easy; Business‑focused Risk Understanding Is Hard

The more time I spend in security, the more I believe tools are the easy part. Understanding risk in a way the business cares about and then acting on it is where most teams struggle.

By Sean D. Mack
Man Who Hacked US Supreme Court Filing System Sentenced to Probation
NewsApr 17, 2026

Man Who Hacked US Supreme Court Filing System Sentenced to Probation

Nicholas Moore pleaded guilty to infiltrating the U.S. Supreme Court’s electronic filing system, as well as the networks of AmeriCorps and the Department of Veterans Affairs, using stolen credentials. He publicly bragged about the breaches on an Instagram account, posting...

By TechCrunch (Cybersecurity)
Anthropic’s New Cybersecurity Model Could Get It Back in the Government’s Good Graces
NewsApr 17, 2026

Anthropic’s New Cybersecurity Model Could Get It Back in the Government’s Good Graces

Anthropic is attempting to repair its fraught relationship with the U.S. government by launching Claude Mythos Preview, a cybersecurity‑focused AI model. The model claims to spot vulnerabilities in major browsers, operating systems and other critical internet infrastructure, and has already...

By The Verge AI
AI‑Driven Hack Exfiltrates 195 Million Records From Nine Mexican Agencies
NewsApr 17, 2026

AI‑Driven Hack Exfiltrates 195 Million Records From Nine Mexican Agencies

A cyber‑espionage campaign that ran from Dec 2025 to Feb 2026 used Anthropic’s Claude and OpenAI’s GPT‑4.1 to breach nine Mexican government agencies, exfiltrating 195 million personal identities, 15.5 million vehicle records and millions of property and civil documents. Researchers say AI acted as...

By Pulse
OpenAI Launches GPT‑5.4‑Cyber, a Security‑focused LLM for Defenders
NewsApr 17, 2026

OpenAI Launches GPT‑5.4‑Cyber, a Security‑focused LLM for Defenders

OpenAI introduced GPT‑5.4‑Cyber, a large language model tuned for defensive cybersecurity tasks, and opened it to a limited pool of vetted researchers, vendors and enterprises. The rollout expands the Trusted Access for Cyber (TAC) program and pits OpenAI’s more permissive...

By Pulse
Man with @Ihackedthegovernment Instagram Account Tells Judge, “I Made a Mistake"
NewsApr 17, 2026

Man with @Ihackedthegovernment Instagram Account Tells Judge, “I Made a Mistake"

A 25‑year‑old Tennessee man, Nicholas Moore, pleaded guilty to unauthorized access of the U.S. Supreme Court’s electronic filing system, AmeriCorps, and the Veterans Administration Health System, then posted victims' personal data on his Instagram account @ihackedthegovernment. The court sentenced him...

By Ars Technica – Security
We Need a Shared Responsibility Model for AI
NewsApr 17, 2026

We Need a Shared Responsibility Model for AI

Researchers uncovered multiple AI vulnerabilities that let attackers steal data, hijack AI browsers, and poison model memories. When the flaws were disclosed, most AI vendors dismissed responsibility, claiming security only covered the model itself. The author argues that, like cloud...

By Security Boulevard
Payouts King Ransomware Uses QEMU VMs to Bypass Endpoint Security
NewsApr 17, 2026

Payouts King Ransomware Uses QEMU VMs to Bypass Endpoint Security

The Payouts King ransomware has begun using the open‑source QEMU emulator to spin up hidden Alpine Linux virtual machines on compromised hosts. By launching these VMs through a SYSTEM‑level scheduled task named TPMProfiler, the malware evades host‑based endpoint scanners and...

By BleepingComputer
Microsoft’s Patch Tuesday Release for April Is a Whopper
NewsApr 17, 2026

Microsoft’s Patch Tuesday Release for April Is a Whopper

Microsoft’s April Patch Tuesday is the largest on record, delivering 165 updates that address roughly 340 unique CVEs, including two zero‑day vulnerabilities—one of which is already being exploited in the wild. The Readiness team recommends “Patch Now” for all major...

By Computerworld – IT Leadership
New RecruitRat, SaferRat, Astrinox, Massiv Android Malware Found Targeting 800 Apps
NewsApr 17, 2026

New RecruitRat, SaferRat, Astrinox, Massiv Android Malware Found Targeting 800 Apps

Zimperium’s zLabs identified four new Android malware families—RecruitRat, SaferRat, Astrinox and Massiv—targeting over 800 banking and crypto apps. The campaigns use phishing and smishing to deliver malicious APKs, then launch overlay attacks that mimic legitimate login screens. By abusing Accessibility...

By HackRead
The White House Weighs Whether Anthropic's Mythos Is Too Valuable for the Federal Government to Refuse
NewsApr 17, 2026

The White House Weighs Whether Anthropic's Mythos Is Too Valuable for the Federal Government to Refuse

Anthropic’s new Claude model, dubbed Mythos, is being touted as a breakthrough AI capable of breaching cyber defenses. After the Pentagon blacklisted the firm for refusing unrestricted access, CEO Dario Amodei met White House Chief of Staff Susie Wiles to...

By THE DECODER
The IMF’s Warning to Banks: Share Data to Beat AI Fraud
NewsApr 17, 2026

The IMF’s Warning to Banks: Share Data to Beat AI Fraud

The International Monetary Fund released a Technical Note at its 2026 Spring Meetings urging banks to break long‑standing data‑sharing taboos. It argues that fragmented transaction and threat data hampers AI‑driven fraud detection, and recommends collaborative exchange via APIs and ISO 20022...

By PaymentsJournal
National Vulnerability Database (NVD) Shifts to Selective Enrichment as CVE Volume Surges
NewsApr 17, 2026

National Vulnerability Database (NVD) Shifts to Selective Enrichment as CVE Volume Surges

The National Institute of Standards and Technology announced that the National Vulnerability Database will now enrich only a select subset of CVEs—those in the CISA KEV catalog, software used by the federal government, and other critical products. Submissions have surged...

By Security Boulevard
Booking.com Breach Shows Exactly How Smishing Attacks Get Made
NewsApr 17, 2026

Booking.com Breach Shows Exactly How Smishing Attacks Get Made

On April 13, 2026 Booking.com disclosed that hackers accessed customer reservation data through a compromised hotel‑partner account. The breach revealed names, phone numbers, email addresses, and detailed booking information, but not financial data. Within days, fraudsters turned the stolen details...

By Security Boulevard
The Race to Quantum-Proof the Internet Has Already Begun
NewsApr 17, 2026

The Race to Quantum-Proof the Internet Has Already Begun

The tech industry is moving from viewing quantum computing as a distant risk to treating it as an imminent threat. Researchers at a Fhenix livestream warned that encrypted data can be harvested now and decrypted later once quantum computers become...

By HackRead
Anthropic’s Project Glasswing Tackles AI Security Challenges in Data Centers
NewsApr 17, 2026

Anthropic’s Project Glasswing Tackles AI Security Challenges in Data Centers

Anthropic has unveiled Project Glasswing, a collaborative effort to embed AI‑driven security into data‑center software stacks. The initiative centers on Claude Mythos, a model that scans for vulnerabilities across cloud platforms and open‑source components in real time. Leading providers such...

By Data Center Knowledge
CISA Tells Feds to Patch 13-Year-Old Apache ActiveMQ Bug Under Active Attack
NewsApr 17, 2026

CISA Tells Feds to Patch 13-Year-Old Apache ActiveMQ Bug Under Active Attack

CISA has placed the 13‑year‑old Apache ActiveMQ remote code execution flaw (CVE‑2026‑34197) on its Known Exploited Vulnerabilities list and issued Binding Operational Directive 22‑01, giving federal civilian agencies until 30 April to apply patches or justify non‑compliance. The bug exploits the Jolokia...

By The Register
Most Enterprises Can't Stop Stage-Three AI Agent Threats, VentureBeat Survey Finds
NewsApr 17, 2026

Most Enterprises Can't Stop Stage-Three AI Agent Threats, VentureBeat Survey Finds

A VentureBeat three‑wave survey of 108 enterprises reveals that most organizations rely on monitoring AI agents without enforcing controls or isolating workloads, a structural gap that leaves them vulnerable to stage‑three threats. While 88% reported AI‑agent security incidents in the...

By VentureBeat
Google Ads API to Require Multi-Factor Authentication
NewsApr 17, 2026

Google Ads API to Require Multi-Factor Authentication

Google is rolling out mandatory multi‑factor authentication (MFA) for new OAuth 2.0 refresh tokens generated through the Google Ads API, starting April 21, 2026. Existing tokens will keep working, but any new authentication will require a second verification step such as a...

By Search Engine Land
The Wall Around Claude 4.7 Does Not Extend to Dread
NewsApr 17, 2026

The Wall Around Claude 4.7 Does Not Extend to Dread

Anthropic unveiled Claude Opus 4.7 on April 16 2026, intentionally reducing its offensive cyber capabilities while adding automated safeguards and a Cyber Verification Program for vetted defenders. Simultaneously, underground forums on Dread, Reddit, and Telegram circulated jailbreaks and a cross‑vendor prompt‑injection attack called...

By Security Boulevard
Pro-Iran Hackers Appear to Increase Critical Infrastructure Cyberattacks
NewsApr 17, 2026

Pro-Iran Hackers Appear to Increase Critical Infrastructure Cyberattacks

Pro‑Iran hacktivist group Ababil of Minab claimed responsibility for a March intrusion of the Los Angeles County Metropolitan Transportation Authority, though analysts say the evidence remains unverified. Federal agencies, including CISA, have warned that Iran‑linked actors are increasingly targeting operational...

By Defense One
ComplianceCow Teams with ServiceNow IRM to Automate HR‑Related Control Monitoring
NewsApr 17, 2026

ComplianceCow Teams with ServiceNow IRM to Automate HR‑Related Control Monitoring

ComplianceCow announced today a native integration with ServiceNow Integrated Risk Management, enabling enterprises to automate continuous evidence collection and control testing for HR‑related compliance. The middleware links cloud, identity and on‑prem systems to ServiceNow IRM, delivering real‑time risk insights without...

By Pulse
IBM Launches AI‑Driven Cyber‑Defense Platform to Counter Autonomous Attacks
NewsApr 17, 2026

IBM Launches AI‑Driven Cyber‑Defense Platform to Counter Autonomous Attacks

IBM announced a two‑part AI security offering—an assessment service from IBM Consulting and the IBM Autonomous Security multi‑agent platform—to help large enterprises detect and remediate autonomous, AI‑driven attacks. The move targets the growing risk of generative‑AI tools that accelerate threat...

By Pulse
Johns Hopkins Study Shows Anthropic, Google, Microsoft AI Agents Can Steal GitHub Credentials
NewsApr 17, 2026

Johns Hopkins Study Shows Anthropic, Google, Microsoft AI Agents Can Steal GitHub Credentials

A Johns Hopkins University researcher demonstrated that AI coding agents from Anthropic, Google and Microsoft can be tricked into stealing GitHub API keys and access tokens. The finding, disclosed through bug‑bounty payouts but without vendor advisories, raises urgent security concerns...

By Pulse
Nigeria’s Corporate Affairs Commission Hit by Cyberattack, Prompting National Probe
NewsApr 17, 2026

Nigeria’s Corporate Affairs Commission Hit by Cyberattack, Prompting National Probe

Nigeria’s Corporate Affairs Commission confirmed a cyberattack on its systems on April 15, triggering an urgent investigation led by the National Information Technology Development Agency. The breach threatens the integrity of corporate filings and highlights gaps in the country’s digital...

By Pulse
Introducing the Future of Salesforce Data Protection: Backup & Recover Next
NewsApr 17, 2026

Introducing the Future of Salesforce Data Protection: Backup & Recover Next

Salesforce announced Backup & Recover Next, its first native backup solution to achieve FedRAMP High compliance. The service offers automated daily backups of standard and custom objects, files, attachments, and sandboxes while staying inside the Salesforce trust boundary. It claims...

By Salesforce Blog (Sales/CRM)
How to Choose the Best Virtual Data Room for Your Company Size: Mid-Market Vs. Enterprise Needs
BlogApr 17, 2026

How to Choose the Best Virtual Data Room for Your Company Size: Mid-Market Vs. Enterprise Needs

Virtual data rooms (VDRs) are now essential for secure, collaborative deal execution, with the market exceeding $2 billion in 2024. Enterprises need advanced security, AI‑driven analytics, and global compliance, while mid‑market firms focus on cost‑effective, user‑friendly solutions. The article compares top...

By HedgeThink
CoChat Launches AI Collaboration Platform to Combat Shadow AI
NewsApr 17, 2026

CoChat Launches AI Collaboration Platform to Combat Shadow AI

CoChat debuted in early April 2026 as an AI collaboration platform aimed at curbing the rise of shadow AI within enterprises. By consolidating access to leading large language models (LLMs) and autonomous agents, it eliminates fragmented, unmanaged AI silos. The...

By SecurityWeek
Check Point Quantum Scales Throughput for Digital Transformation
BlogApr 17, 2026

Check Point Quantum Scales Throughput for Digital Transformation

Check Point Software Technologies showcased its Quantum firewall, paired with ThreatCloud AI, in a Philippine commercial bank and an Angolan telecom provider. Frost & Sullivan’s report finds the solution delivers higher throughput, automated threat prevention, and unified policy management, overcoming...

By Quantum Zeitgeist
Secure-by-Design: 3 Principles to Safely Scale Agentic AI
NewsApr 17, 2026

Secure-by-Design: 3 Principles to Safely Scale Agentic AI

Enterprise adoption of agentic AI is shifting from experimental copilots to autonomous agents that execute decisions across environments. This expands the attack surface, prompting a secure‑by‑design shift championed by a CrowdStrike‑NVIDIA blueprint. The article outlines three core principles: treating AI...

By CIO.com
Mythos Could Exploit Vulnerabilities, Raising Skynet Concerns
SocialApr 17, 2026

Mythos Could Exploit Vulnerabilities, Raising Skynet Concerns

Mythos, Anthropic’s not yet released model, allegedly can not only find security gaps but exploit them. How far from Skynet are we?

By David J. Doherty
Questioning Peston’s Access to Sensitive Email Traffic
SocialApr 17, 2026

Questioning Peston’s Access to Sensitive Email Traffic

Congratulations @Peston on getting access to such sensitive email traffic Obviously you’ve only got the important bits…& there’s obviously nothing further to see here btw who gave you access & why?

By rhomboid1MF
VMRay Announces Sovereign European Cloud for Advanced Threat Analysis
NewsApr 17, 2026

VMRay Announces Sovereign European Cloud for Advanced Threat Analysis

VMRay unveiled the VMRay Sovereign European Cloud, a SaaS platform that delivers advanced threat analysis while guaranteeing full data residency within Europe. The service runs on the AWS European Sovereign Cloud and is operated by a Luxembourg‑incorporated entity, providing physical...

By AiThority » Sales Enablement
Third‑Party Risks Cause Over One‑Third of Breaches
SocialApr 17, 2026

Third‑Party Risks Cause Over One‑Third of Breaches

Over 35% of data breaches are caused by vendors or partners, not internal failures. As threats spread globally, third-party risk is growing. Security is only as strong as the weakest link. https://t.co/e3kXTsRA5f

By Cristina Dolan
Inside an Underground Guide: How Threat Actors Vet Stolen Credit Card Shops
NewsApr 17, 2026

Inside an Underground Guide: How Threat Actors Vet Stolen Credit Card Shops

An underground guide uncovered by Flare analysts reveals how cyber‑criminals now vet stolen‑card marketplaces. The document outlines a disciplined vetting process—checking domain age, SSL, WHOIS, mirror sites, and community reputation—to avoid scams and law‑enforcement takedowns. It also highlights the adoption...

By BleepingComputer
Critical Exploits, AI Shifts, and Major Breaches Redefine Cybersecurity This Week
NewsApr 17, 2026

Critical Exploits, AI Shifts, and Major Breaches Redefine Cybersecurity This Week

This week’s cybersecurity briefing highlighted a wave of active exploits, including a critical Nginx UI authentication bypass, an Android SDK flaw affecting over 50 million users, and the NWHStealer infostealer spreading via fake VPN sites. Anthropic’s Project Glasswing showcased AI‑driven vulnerability...

By eSecurity Planet
New Mirai Variant Nexcorium Hijacks DVR Devices for DDoS Attacks
NewsApr 17, 2026

New Mirai Variant Nexcorium Hijacks DVR Devices for DDoS Attacks

Fortinet’s FortiGuard Labs uncovered Nexcorium, a new Mirai‑derived malware that hijacks TBK DVR‑4104 and DVR‑4216 video recorders via the CVE‑2024‑3721 command‑injection flaw. The variant spreads across IoT devices, installs persistence mechanisms, and uses hard‑coded default passwords to recruit additional cameras...

By HackRead
AI Upgrades, Security Breaches, and Industry Shifts Define This Week in Tech
NewsApr 17, 2026

AI Upgrades, Security Breaches, and Industry Shifts Define This Week in Tech

This week’s tech headlines were dominated by a surge of AI upgrades, from Anthropic’s Claude Opus 4.7 with self‑verification to OpenAI’s expanded Codex app and the cybersecurity‑focused GPT‑5.4‑Cyber. Major vendors also rolled out security fixes, with Microsoft patching 165 Windows flaws...

By TechRepublic – Articles
Bluesky Outage: Coordinated Traffic Attack Causes Widespread Errors
NewsApr 17, 2026

Bluesky Outage: Coordinated Traffic Attack Causes Widespread Errors

Bluesky experienced a coordinated distributed denial‑of‑service (DDoS) attack that began early Thursday, April 17, 2026, and stretched into a second day. The flood of traffic crippled core functions such as feeds, notifications, threads, search and the Discover section, producing rate‑limit...

By TechRepublic – Articles
Unwanted Anonymous Email Sparks Creepy Concern
SocialApr 17, 2026

Unwanted Anonymous Email Sparks Creepy Concern

Few folks have reached out after having received this email, which is a new one for me. It's most certainly not me—it's weird and creepy and I'd really like it to stop. https://t.co/5ora12ynHG

By Rory Johnston
He Was Laid Off, Posted on LinkedIn — Then Scammers Started Impersonating Real Recruiters to Target Him
NewsApr 17, 2026

He Was Laid Off, Posted on LinkedIn — Then Scammers Started Impersonating Real Recruiters to Target Him

Nick Russell posted his layoff from Epic Games on LinkedIn and was immediately swamped with recruiter messages, one of which turned out to be a scam. Cybercriminals are now hijacking real recruiters' LinkedIn profiles, referencing actual resumes and job openings,...

By Entrepreneur » Sales
Commercial AI Models Show Rapid Gains in Vulnerability Research
NewsApr 17, 2026

Commercial AI Models Show Rapid Gains in Vulnerability Research

Forescout’s Verde Labs reports that commercial AI models have closed the gap in vulnerability research, with all tested models now completing full research tasks and half generating working exploits autonomously. The most capable models, Claude Opus 4.6 and Kimi K2.5, can discover...

By Infosecurity Magazine
Capsule Security Raises $7 M to Guard AI Agents as New Privileged Users
NewsApr 17, 2026

Capsule Security Raises $7 M to Guard AI Agents as New Privileged Users

Capsule Security, a Tel‑Aviv‑based startup, closed a $7 million seed round led by Lama Partners and Forgepoint Capital International to launch a runtime‑security platform for AI agents. The funding targets a market where more than 80% of Fortune 500 firms now deploy...

By Pulse
Tuta Opens Closed Beta for Quantum‑Resistant Cloud Storage Platform
NewsApr 17, 2026

Tuta Opens Closed Beta for Quantum‑Resistant Cloud Storage Platform

Tuta announced a closed‑beta launch of Tuta Drive, a cloud storage service built with quantum‑safe cryptography, starting April 16. The invite‑only program gives early users end‑to‑end encrypted storage hosted in Germany, positioning the firm ahead of Google Drive and OneDrive...

By Pulse
OzCon Brings Real-World Attack Tactics to Kansas on May 18, 2026
NewsApr 17, 2026

OzCon Brings Real-World Attack Tactics to Kansas on May 18, 2026

OzCon, a one‑day cybersecurity conference, launches in Overland Park, Kansas on May 18, 2026, featuring live demonstrations of nation‑state tactics, physical and social engineering exploits, and a hands‑on Capture‑the‑Flag. Founder Renee Chronister says the event closes the gap between imagined...

By Pulse
Data Sharing: Is It Safe? Is It Secure? Everything You Need to Know
NewsApr 17, 2026

Data Sharing: Is It Safe? Is It Secure? Everything You Need to Know

Salesforce’s guide explains how SMBs can share data safely by using a unified CRM platform that enforces granular permissions and AI‑driven security checks. It cites that 51% of organizations saw a rise in cyber attacks in 2025, while 80% of...

By Salesforce Blog (Sales/CRM)
SEO Poisoning Attack Uses Microsoft Binary to Install RMM Tool
NewsApr 17, 2026

SEO Poisoning Attack Uses Microsoft Binary to Install RMM Tool

Researchers uncovered an SEO‑poisoning campaign that tricks users searching for the open‑source recovery tool TestDisk into downloading a trojanized installer. The fake installer is a Microsoft‑signed Setup binary that uses DLL sideloading to load a malicious autorun.dll, which then installs...

By GBHackers On Security
The Cyber Express Weekly Roundup: Crypto Breaches, State-Linked Schemes, and Platform Exploits
NewsApr 17, 2026

The Cyber Express Weekly Roundup: Crypto Breaches, State-Linked Schemes, and Platform Exploits

The Cyber Express weekly roundup highlighted a series of high‑profile cyber incidents. Grinex halted trading after a coordinated wallet breach that stole more than $15 million in USDT, while two U.S. citizens were sentenced for a North Korea‑linked scheme that generated...

By The Cyber Express
Brussels Launched an Age Checking App. It Took 2 Minutes to Hack It.
NewsApr 17, 2026

Brussels Launched an Age Checking App. It Took 2 Minutes to Hack It.

European Commission President Ursula von der Leyen unveiled a mobile age‑verification app intended to protect minors online. Within minutes, cybersecurity researchers demonstrated that the app could be hacked, exposing hard‑coded credentials and insecure data handling. The flaws raise serious privacy...

By DataBreaches.net