Today's Cybersecurity Pulse

Bol denies alleged fake data breach of 400,000 customers
A hacker claimed to have stolen personal data of 400,000 Belgian Bol customers and posted the alleged dataset for sale on a dark‑web forum for €100 (about $109). Bol, owned by Ahold Delhaize, publicly denied any breach and said it had no knowledge of the alleged data. The story was reported by Retail Detail and SC Media.
Polkadot Drops 10% After Hyperbridge Hack Creates 1 Billion Fake DOT Tokens
Polkadot’s price slumped 10% after an attacker exploited the Hyperbridge cross‑chain protocol, minting 1 billion counterfeit DOT tokens. The breach netted only $237,000 in real value, but it underscored persistent vulnerabilities in DeFi bridge infrastructure.

Oligo Security Moves Beyond CVE Prioritization with Real-Time Application-Layer Exploit Blocking
Oligo Security unveiled Runtime Exploit Blocking, a capability that intercepts application‑layer exploit attempts in real time without terminating containers or disrupting services. The technology correlates function calls with system activity to detect malicious sequences and blocks the offending system call...

Manifest Platform From Manifold Targets AI Agent Supply Chain Security Gaps
Manifold Security launched Manifest, a free, open‑access platform that maps AI agent supply‑chain dependencies and external system interactions. The graph‑based service builds execution and environment graphs to reveal hidden risk patterns that traditional file‑level scans miss. Manifold’s accompanying report identified...

FossID Launches Agentic SCA to Bring Real-Time Compliance to AI-Driven Code Development
FossID AB introduced Agentic SCA, a real‑time software composition analysis layer designed for AI‑driven code development. The solution embeds compliance checks directly into AI agents, enabling instant detection of open‑source components, license obligations, and vulnerabilities as code is written. By...

DavMail 6.6.0 Patches a Regex Flaw and Advances Its Microsoft Graph Backend
DavMail 6.6.0 was released this week, addressing a regex‑based security alert, updating the OAuth redirect URI to match Microsoft’s recent OIDC change, and fixing multiple IMAP, SMTP, CalDAV and CardDAV bugs. The update adds VCARD4 birthday support, switches CardDAV photo...

Kraken Is Actively Being Extorted by Criminals Threatening to Release the Top Crypto Exchange’s Internal Data
Kraken disclosed that criminals are extorting the exchange after two support employees improperly accessed limited client data. Approximately 2,000 accounts, representing 0.02% of its user base, were potentially viewed, but the core trading and custody systems were not breached and...

Intruder Adds Container Image Scanning to Cloud Security Platform
Intruder has expanded its cloud security platform to include daily container image scanning across AWS Elastic Container Registry, Google Cloud Artifact Registry, and Azure Container Registry. The new capability uses a graphical interface that requires no agents, letting both security...
Why CIOs Are Moving Away From Legacy Consulting in the AI Era
CIOs are abandoning traditional consulting firms as AI accelerates transformation and exposes gaps in strategy‑execution alignment. Legacy firms’ sequential approach and post‑hoc security fail to meet the speed, precision, and accountability CIOs now demand. New‑generation firms that embed security and...

3 Quantum Realities to Confront This World Quantum Day
World Quantum Day highlighted the accelerating timeline toward a post‑quantum future, with industry leaders warning that waiting for certainty will delay critical migration. Experts emphasized that the operational risk lies in how long it takes to identify dependencies, prioritize remediation,...
China-Linked Cloud Credential Heist Runs on Typos and SMTP
Chinese‑aligned APT41 has deployed a Linux ELF backdoor that steals cloud credentials across AWS, GCP, Azure and Alibaba Cloud. The malware uses port 25 SMTP as a covert C2 channel, sending harvested IAM role and service‑account tokens to three typosquatted...

Cloud Storage Security Announces the Official Launch of DataDefender, a Novel DSPM Platform Focused on Data Stored in the Cloud
Cloud Storage Security launched DataDefender, an AI‑driven Data Security Posture Management (DSPM) platform that classifies and monitors cloud‑stored data in real time. The solution spotlights sensitive information across AWS environments, flagging misconfigurations, insider threats, and external attacks while supporting compliance...
Regulators Flag AI as Emerging Financial Stability Threat
Regulators are starting to take AI risks seriously. U.S. officials have warned banks about the cybersecurity threats posed by increasingly powerful AI systems, signaling concern at the highest levels. This is a shift. AI is no longer just a tech issue, it...
What Is Anthropic's Mythos AI Model and Why Does It Have the Financial World in a Panic?
Anthropic PBC unveiled Mythos, a general‑purpose AI model that can independently locate and exploit high‑severity software vulnerabilities. The company disclosed that Mythos identified thousands of flaws across major operating systems and browsers, prompting Anthropic to restrict public release and instead...
Anchore Enterprise and the DoD DevSecOps Reference Design
Anchore Enterprise has been tightly woven into the Department of Defense’s DevSecOps Reference Design, providing automated security guardrails across every stage of the software factory. By generating SBOMs, enforcing policy‑as‑code, and continuously scanning containers, Anchore stops vulnerable code before it...

DataVisor Brings Conversational AI Agents to Fraud and AML Operations
DataVisor unveiled Vera, a conversational AI agent suite that lets financial institutions manage fraud and AML tasks through plain‑language commands. The platform automates detection, investigation, and regulatory reporting, promising up to three‑fold gains in detection coverage and a 20‑30× reduction...

SAP Patches Critical ABAP Vulnerability
SAP released 20 new and updated security notes on April 14, 2026, including two critical CVEs. The most severe, CVE‑2026‑27681 (CVSS 9.9), is a SQL‑injection flaw in Business Planning and Consolidation and Business Warehouse that enables arbitrary code execution. SAP mitigated the issue...
The Veto Is Gone: Hungary’s Election Upends EU-Ukraine Cyber Defense and Data Sovereignty Dynamics
Hungarian Prime Minister Viktor Orban’s defeat and Peter Magyar’s landslide win removed Hungary’s veto that blocked a €90 billion ($97 billion) Ukraine aid package. The loan is now expected to be finalized, channeling funds into Ukraine’s digital infrastructure, cyber‑defense capacity, and EU‑aligned...

Anthropic’s Mythos Raises the Stakes for Software Security
Anthropic has placed its new Claude Mythos preview model—capable of uncovering thousands of previously unknown software vulnerabilities—behind a tightly controlled early‑access program. The company limited access to a select group of major technology and security firms, citing the model’s dual‑use...

How Contact Centers Detect and Prevent Fraud
Contact centers are increasingly targeted by fraudsters exploiting weak authentication and under‑trained agents, especially as operations shift to digital and remote channels. Common schemes include identity theft, account takeover, card‑not‑present purchases, and vishing attacks that leverage caller‑ID spoofing and synthetic...
DNS Security Is Often Inadequate, and Network Engineers Should Get More Involved
Enterprise Management Associates’ DDI Directions 2026 report reveals that only 28% of DDI experts consider their DNS infrastructure fully secure. Threats are evolving, with 86% of enterprises witnessing AI‑enhanced DNS attacks and concerns ranging from malicious redirections to DDoS and...

Triad Nexus Evades Sanctions to Fuel Cybercrime
Triad Nexus, an illicit cyber‑crime network active since 2020, has generated over $200 million in losses through sophisticated cryptocurrency investment‑fraud known as pig‑butchering. After the U.S. sanctioned its primary CDN partner Funnull in 2025, the group adopted infrastructure‑laundering tactics, using front‑company...
How Hackers Are Thinking About AI
A new academic paper examines over 160 cyber‑crime forum posts collected across seven months, revealing how hackers are beginning to incorporate artificial intelligence into their operations. The research shows a dual mindset: strong curiosity about leveraging both off‑the‑shelf AI services...
QBS Software Africa, Partners to Tackle AI Threats at ITWeb Security Summit 2026
QBS Software Africa (Maxtec) will showcase AI‑focused security solutions alongside partners Atera, Fortinet, Fortra, Ivanti and Thales at the ITWeb Security Summit in Johannesburg. The event will address rising AI‑driven attacks, supply‑chain vulnerabilities, and the acute cybersecurity skills shortage in...
Microsoft Tests OpenClaw‑Style Security Features for Enterprise 365 Copilot
Microsoft confirmed it is testing OpenClaw‑inspired security and governance controls for its Microsoft 365 Copilot, targeting large‑enterprise users. The effort builds on earlier agentic tools like Copilot Cowork and aims to deliver an always‑on assistant that can act autonomously while...

FCC Advances Consumer IoT Protection Scheme
The Federal Communications Commission has moved forward with a voluntary cybersecurity program for consumer Internet of Things (IoT) devices by naming the ioXT Alliance as the lead administrator of the US Cyber Trust Mark Programme. The scheme will allow qualifying...
Ontario AI Law Labeled ‘Empty Shell’ by Privacy Watchdog, Raising Insurance Risks
Ontario’s Office of the Information and Privacy Commissioner warned that the province’s AI legislation, the Enhancing Digital Security and Trust Act (EDSTA), is “no more than an empty shell.” The critique highlights a regulatory gap that could leave insurers scrambling...
Petabyte‑Scale Breaches Sweep U.S. and Global Targets, Sparking Data Governance Alarm
In early 2026 a cascade of cyber incidents stole up to ten petabytes of data from high‑profile organizations, including a 375‑terabyte breach at Lockheed Martin and a ransomware hit on PowerSchool that exposed 60 million children. The attacks have ignited a...

Ransomware-Linked ViperTunnel Malware Hits UK and US Businesses
InfoGuard discovered a new Python‑based backdoor called ViperTunnel operating in UK and US enterprises. The malware disguises itself as a system DLL and leverages the sitecustomize.py module to execute code automatically, establishing a SOCKS5 proxy on port 443. Developed by the...
Microsoft Threat Intelligence Says AI Is Now a Core Tool for Cyber‑attackers
Microsoft Threat Intelligence released a report confirming that attackers are using generative AI across scouting, phishing, malware creation and infrastructure building, turning AI into a “force multiplier.” The finding spotlights a rapid shift in the threat landscape, with nation‑state groups...

Risk of Fraud and Disruption After Data Breach on Mexico Port Platform
A hacker from the Mexican group Sociedad Privada 157 breached the Ministry of the Navy’s Safe Smart Port (PIS) platform, exfiltrating 39.7 GB of data on roughly 640,000 logistics personnel. The compromised records include biometric identifiers, social security numbers, taxpayer IDs and...

Goldman Sachs ‘Hyperaware’ of AI Risks; Working with Anthropic on Mythos
Goldman Sachs warned that Anthropic’s new AI model, Mythos, can autonomously discover and exploit software vulnerabilities, raising serious cyber‑risk concerns for the financial sector. The bank’s CEO David Solomon said Goldman is "hyperaware" of these threats and is working with...
InfoReg Raises Alarm as Data Breaches Hit 788 in Q1
South Africa’s Information Regulator recorded 788 data‑breach notifications in the first quarter, a sharp rise that includes high‑profile incidents at Standard Bank, Liberty Group and Statistics South Africa. The regulator, led by Advocate Pansy Tlakula, warned that many reports lack...

Nightclub Giant RCI Hospitality Reports Data Breach
RCI Hospitality Holdings, a leading adult nightclub operator, disclosed a data breach affecting its independent contractors. The breach stemmed from an insecure direct object reference (IDOR) vulnerability on an IIS web server discovered on March 23, with unauthorized access beginning March 19....

Italtel, Quantum Bridge Partner to Protect Critical Communications
Italian system integrator Italtel has formed a strategic partnership with Canadian quantum‑security specialist Quantum Bridge Technologies to deliver post‑quantum communication solutions worldwide. The collaboration aims to embed quantum‑safe encryption into existing network infrastructures, targeting telecom operators, enterprises, and critical‑infrastructure owners....

AI Security Institute Advocates Security Best Practices After Mythos Test
The AI Security Institute (AISI) evaluated Anthropic’s Claude Mythos Preview, finding it could autonomously execute multi‑stage attacks and complete 22 of 32 steps in a simulated corporate network. The model succeeded in three out of ten attempts, highlighting both its...

Germany Complains About Hybrid Attacks
Germany’s defence ministry warned that hybrid attacks are targeting the country’s critical infrastructure and Bundeswehr units deployed abroad. Vice Admiral Thomas Daum said soldiers in Lithuania suspect phone‑call interception and disinformation campaigns, while citing drone strikes, espionage and sabotage of data...
The Mythos Threat: Why Treasurers Must Prepare for the AI Arms Race
Anthropic’s new Claude Mythos model can autonomously discover zero‑day vulnerabilities across major operating systems and browsers, turning a defensive AI tool into a potent offensive weapon. The capability has triggered emergency meetings between transatlantic regulators and the world’s largest banks,...
The AI Inflection Point: What Security Leaders Must Do Now
AI has moved from experiment to production in cybersecurity, forcing security leaders to treat it as an operating‑model shift rather than a bolt‑on tool. Threat reports show AI‑enabled adversaries accelerating attack timelines to under 30 minutes, outpacing human‑only triage. CISOs...

108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users
Security researchers have uncovered a coordinated campaign involving 108 malicious Chrome extensions that share a common command‑and‑control server. The extensions, published under five publisher names, have collectively been installed about 20,000 times and harvest Google OAuth credentials, Telegram Web session...

Cyber Risk Ratings Fade Out; Actionable Intelligence Takes The Spotlight
The Forrester Wave™ Q2 2026 shows cyber risk rating platforms losing influence as firms demand actionable intelligence. Vendors are re‑engineering solutions to serve third‑party risk management rather than merely delivering scores. AI capabilities remain nascent, with only a few providers showcasing...
Hackers Steal Healthcare Recruitment Data
Hackers identifying themselves as XP95 claim to have exfiltrated roughly half a million files from Healthdaq, a recruitment platform used by health trusts in Northern Ireland. The stolen data spans driving licences, criminal background checks, vaccine records, passports and other...
Curious About Quantum? Check Out Training Options From ISC2, IBM, AWS and More
The quantum computing sector is accelerating toward a so‑called Q‑day, projected by Forrester to arrive by 2030, as vendors move from theoretical fault‑tolerant designs to early engineering reality. IBM targets fault‑tolerant quantum processors by 2029, while industry leaders warn that...
Too Many False Alerts Kill Trust and Attention
The Law of False Alerts: “As the rate of erroneous alerts increases, operator reliance, or belief, in subsequent warnings decreases.” Too many alerts and people stop reading them. Too many false positives and people stop trusting them.

Hackers Exploit Kali Forms Vulnerability to Take Over WordPress Sites
A critical Remote Code Execution (RCE) flaw was discovered in the Kali Forms WordPress plugin, which powers over 10,000 active sites. The vulnerability, reported on March 2, 2026, was patched in version 2.4.10 on March 20, 2026, but attackers began exploiting it the same day,...

Research Bits: Apr. 14
Researchers from Hong Kong, Tsinghua and Southern University of Science and Technology unveiled CLAP, a memristor‑based platform that fuses physically unclonable function authentication with compute‑in‑memory, achieving 99.46% AUC on ECG data while shrinking area and power use. A separate team...

China Leads State‑Sponsored Cyberattacks on U.S.,
"The United States is China’s #1 target for Cyberattacks. From 2000-2023, China was responsible for 240 statesponsored or state-affiliated cyberattacks, followed by Russia at 158 and Iran at 102." Great note from the always brilliant Michael Cembalest on the economic...
AI Is Simplifying Online Crime, Danger Escalates
AI is already making online crimes easier. It could get much worse. | MIT Technology Review https://t.co/OOi3OhIPMa

Booking.com Suffers Data Breach, Leaves Guests’ Personal Details Exposed
Booking.com confirmed a data breach that exposed guests' names, emails, phone numbers and reservation details, though financial information remained untouched. The company has not disclosed the number of affected customers, prompting heightened regulator scrutiny after a 2018 breach that resulted...

Evaluating Trust, ROI, and Risks of Anthropic's Security Model
Mythos ~ Anthropic released a new model they claim is scary good at finding security vulnerabilities. What questions should we be asking? No hot take. Just pondering how we can trust a model, the ROI, and how we can evaluate the...
Generative AI Now Finds Zero-Day Vulnerabilities, Prediction Proven
Three years ago, I said in my talks that generative AI would eventually start discovering zero-day vulnerabilities. At the time, many people dismissed the idea as unrealistic. It is no longer unrealistic. https://t.co/Xrh5MjNmuA