Know What's Happening in Cybersecurity

Today's Cybersecurity Pulse

Bol denies alleged fake data breach of 400,000 customers

A hacker claimed to have stolen personal data of 400,000 Belgian Bol customers and posted the alleged dataset for sale on a dark‑web forum for €100 (about $109). Bol, owned by Ahold Delhaize, publicly denied any breach and said it had no knowledge of the alleged data. The story was reported by Retail Detail and SC Media.

Oligo Security Moves Beyond CVE Prioritization with Real-Time Application-Layer Exploit Blocking
NewsApr 14, 2026

Oligo Security Moves Beyond CVE Prioritization with Real-Time Application-Layer Exploit Blocking

Oligo Security unveiled Runtime Exploit Blocking, a capability that intercepts application‑layer exploit attempts in real time without terminating containers or disrupting services. The technology correlates function calls with system activity to detect malicious sequences and blocks the offending system call...

By SiliconANGLE
Manifest Platform From Manifold Targets AI Agent Supply Chain Security Gaps
NewsApr 14, 2026

Manifest Platform From Manifold Targets AI Agent Supply Chain Security Gaps

Manifold Security launched Manifest, a free, open‑access platform that maps AI agent supply‑chain dependencies and external system interactions. The graph‑based service builds execution and environment graphs to reveal hidden risk patterns that traditional file‑level scans miss. Manifold’s accompanying report identified...

By SiliconANGLE
FossID Launches Agentic SCA to Bring Real-Time Compliance to AI-Driven Code Development
NewsApr 14, 2026

FossID Launches Agentic SCA to Bring Real-Time Compliance to AI-Driven Code Development

FossID AB introduced Agentic SCA, a real‑time software composition analysis layer designed for AI‑driven code development. The solution embeds compliance checks directly into AI agents, enabling instant detection of open‑source components, license obligations, and vulnerabilities as code is written. By...

By SiliconANGLE
DavMail 6.6.0 Patches a Regex Flaw and Advances Its Microsoft Graph Backend
NewsApr 14, 2026

DavMail 6.6.0 Patches a Regex Flaw and Advances Its Microsoft Graph Backend

DavMail 6.6.0 was released this week, addressing a regex‑based security alert, updating the OAuth redirect URI to match Microsoft’s recent OIDC change, and fixing multiple IMAP, SMTP, CalDAV and CardDAV bugs. The update adds VCARD4 birthday support, switches CardDAV photo...

By Help Net Security
Kraken Is Actively Being Extorted by Criminals Threatening to Release the Top Crypto Exchange’s Internal Data
NewsApr 14, 2026

Kraken Is Actively Being Extorted by Criminals Threatening to Release the Top Crypto Exchange’s Internal Data

Kraken disclosed that criminals are extorting the exchange after two support employees improperly accessed limited client data. Approximately 2,000 accounts, representing 0.02% of its user base, were potentially viewed, but the core trading and custody systems were not breached and...

By CryptoSlate
Intruder Adds Container Image Scanning to Cloud Security Platform
NewsApr 14, 2026

Intruder Adds Container Image Scanning to Cloud Security Platform

Intruder has expanded its cloud security platform to include daily container image scanning across AWS Elastic Container Registry, Google Cloud Artifact Registry, and Azure Container Registry. The new capability uses a graphical interface that requires no agents, letting both security...

By Container Journal
Why CIOs Are Moving Away From Legacy Consulting in the AI Era
NewsApr 14, 2026

Why CIOs Are Moving Away From Legacy Consulting in the AI Era

CIOs are abandoning traditional consulting firms as AI accelerates transformation and exposes gaps in strategy‑execution alignment. Legacy firms’ sequential approach and post‑hoc security fail to meet the speed, precision, and accountability CIOs now demand. New‑generation firms that embed security and...

By CIO.com
3 Quantum Realities to Confront This World Quantum Day
NewsApr 14, 2026

3 Quantum Realities to Confront This World Quantum Day

World Quantum Day highlighted the accelerating timeline toward a post‑quantum future, with industry leaders warning that waiting for certainty will delay critical migration. Experts emphasized that the operational risk lies in how long it takes to identify dependencies, prioritize remediation,...

By Security Magazine (Cybersecurity)
China-Linked Cloud Credential Heist Runs on Typos and SMTP
NewsApr 14, 2026

China-Linked Cloud Credential Heist Runs on Typos and SMTP

Chinese‑aligned APT41 has deployed a Linux ELF backdoor that steals cloud credentials across AWS, GCP, Azure and Alibaba Cloud. The malware uses port 25 SMTP as a covert C2 channel, sending harvested IAM role and service‑account tokens to three typosquatted...

By CSO Online
Cloud Storage Security Announces the Official Launch of DataDefender, a Novel DSPM Platform Focused on Data Stored in the Cloud
BlogApr 14, 2026

Cloud Storage Security Announces the Official Launch of DataDefender, a Novel DSPM Platform Focused on Data Stored in the Cloud

Cloud Storage Security launched DataDefender, an AI‑driven Data Security Posture Management (DSPM) platform that classifies and monitors cloud‑stored data in real time. The solution spotlights sensitive information across AWS environments, flagging misconfigurations, insider threats, and external attacks while supporting compliance...

By StorageNewsletter
Regulators Flag AI as Emerging Financial Stability Threat
SocialApr 14, 2026

Regulators Flag AI as Emerging Financial Stability Threat

Regulators are starting to take AI risks seriously. U.S. officials have warned banks about the cybersecurity threats posed by increasingly powerful AI systems, signaling concern at the highest levels. This is a shift. AI is no longer just a tech issue, it...

By Spiros Margaris
What Is Anthropic's Mythos AI Model and Why Does It Have the Financial World in a Panic?
NewsApr 14, 2026

What Is Anthropic's Mythos AI Model and Why Does It Have the Financial World in a Panic?

Anthropic PBC unveiled Mythos, a general‑purpose AI model that can independently locate and exploit high‑severity software vulnerabilities. The company disclosed that Mythos identified thousands of flaws across major operating systems and browsers, prompting Anthropic to restrict public release and instead...

By Financial Post — Finance
Anchore Enterprise and the DoD DevSecOps Reference Design
NewsApr 14, 2026

Anchore Enterprise and the DoD DevSecOps Reference Design

Anchore Enterprise has been tightly woven into the Department of Defense’s DevSecOps Reference Design, providing automated security guardrails across every stage of the software factory. By generating SBOMs, enforcing policy‑as‑code, and continuously scanning containers, Anchore stops vulnerable code before it...

By Security Boulevard – DevOps
DataVisor Brings Conversational AI Agents to Fraud and AML Operations
NewsApr 14, 2026

DataVisor Brings Conversational AI Agents to Fraud and AML Operations

DataVisor unveiled Vera, a conversational AI agent suite that lets financial institutions manage fraud and AML tasks through plain‑language commands. The platform automates detection, investigation, and regulatory reporting, promising up to three‑fold gains in detection coverage and a 20‑30× reduction...

By Help Net Security
SAP Patches Critical ABAP Vulnerability
NewsApr 14, 2026

SAP Patches Critical ABAP Vulnerability

SAP released 20 new and updated security notes on April 14, 2026, including two critical CVEs. The most severe, CVE‑2026‑27681 (CVSS 9.9), is a SQL‑injection flaw in Business Planning and Consolidation and Business Warehouse that enables arbitrary code execution. SAP mitigated the issue...

By SecurityWeek
The Veto Is Gone: Hungary’s Election Upends EU-Ukraine Cyber Defense and Data Sovereignty Dynamics
BlogApr 14, 2026

The Veto Is Gone: Hungary’s Election Upends EU-Ukraine Cyber Defense and Data Sovereignty Dynamics

Hungarian Prime Minister Viktor Orban’s defeat and Peter Magyar’s landslide win removed Hungary’s veto that blocked a €90 billion ($97 billion) Ukraine aid package. The loan is now expected to be finalized, channeling funds into Ukraine’s digital infrastructure, cyber‑defense capacity, and EU‑aligned...

By ComplexDiscovery
Anthropic’s Mythos Raises the Stakes for Software Security
NewsApr 14, 2026

Anthropic’s Mythos Raises the Stakes for Software Security

Anthropic has placed its new Claude Mythos preview model—capable of uncovering thousands of previously unknown software vulnerabilities—behind a tightly controlled early‑access program. The company limited access to a select group of major technology and security firms, citing the model’s dual‑use...

By Logistics Viewpoints
How Contact Centers Detect and Prevent Fraud
NewsApr 14, 2026

How Contact Centers Detect and Prevent Fraud

Contact centers are increasingly targeted by fraudsters exploiting weak authentication and under‑trained agents, especially as operations shift to digital and remote channels. Common schemes include identity theft, account takeover, card‑not‑present purchases, and vishing attacks that leverage caller‑ID spoofing and synthetic...

By TechTarget SearchERP
DNS Security Is Often Inadequate, and Network Engineers Should Get More Involved
NewsApr 14, 2026

DNS Security Is Often Inadequate, and Network Engineers Should Get More Involved

Enterprise Management Associates’ DDI Directions 2026 report reveals that only 28% of DDI experts consider their DNS infrastructure fully secure. Threats are evolving, with 86% of enterprises witnessing AI‑enhanced DNS attacks and concerns ranging from malicious redirections to DDoS and...

By Network World
Triad Nexus Evades Sanctions to Fuel Cybercrime
NewsApr 14, 2026

Triad Nexus Evades Sanctions to Fuel Cybercrime

Triad Nexus, an illicit cyber‑crime network active since 2020, has generated over $200 million in losses through sophisticated cryptocurrency investment‑fraud known as pig‑butchering. After the U.S. sanctioned its primary CDN partner Funnull in 2025, the group adopted infrastructure‑laundering tactics, using front‑company...

By SecurityWeek
How Hackers Are Thinking About AI
BlogApr 14, 2026

How Hackers Are Thinking About AI

A new academic paper examines over 160 cyber‑crime forum posts collected across seven months, revealing how hackers are beginning to incorporate artificial intelligence into their operations. The research shows a dual mindset: strong curiosity about leveraging both off‑the‑shelf AI services...

By Schneier on Security
QBS Software Africa, Partners to Tackle AI Threats at ITWeb Security Summit 2026
NewsApr 14, 2026

QBS Software Africa, Partners to Tackle AI Threats at ITWeb Security Summit 2026

QBS Software Africa (Maxtec) will showcase AI‑focused security solutions alongside partners Atera, Fortinet, Fortra, Ivanti and Thales at the ITWeb Security Summit in Johannesburg. The event will address rising AI‑driven attacks, supply‑chain vulnerabilities, and the acute cybersecurity skills shortage in...

By ITWeb (South Africa) – Public Sector
Microsoft Tests OpenClaw‑Style Security Features for Enterprise 365 Copilot
NewsApr 14, 2026

Microsoft Tests OpenClaw‑Style Security Features for Enterprise 365 Copilot

Microsoft confirmed it is testing OpenClaw‑inspired security and governance controls for its Microsoft 365 Copilot, targeting large‑enterprise users. The effort builds on earlier agentic tools like Copilot Cowork and aims to deliver an always‑on assistant that can act autonomously while...

By Pulse
FCC Advances Consumer IoT Protection Scheme
NewsApr 14, 2026

FCC Advances Consumer IoT Protection Scheme

The Federal Communications Commission has moved forward with a voluntary cybersecurity program for consumer Internet of Things (IoT) devices by naming the ioXT Alliance as the lead administrator of the US Cyber Trust Mark Programme. The scheme will allow qualifying...

By Mobile World Live
Ontario AI Law Labeled ‘Empty Shell’ by Privacy Watchdog, Raising Insurance Risks
NewsApr 14, 2026

Ontario AI Law Labeled ‘Empty Shell’ by Privacy Watchdog, Raising Insurance Risks

Ontario’s Office of the Information and Privacy Commissioner warned that the province’s AI legislation, the Enhancing Digital Security and Trust Act (EDSTA), is “no more than an empty shell.” The critique highlights a regulatory gap that could leave insurers scrambling...

By Pulse
Petabyte‑Scale Breaches Sweep U.S. and Global Targets, Sparking Data Governance Alarm
NewsApr 14, 2026

Petabyte‑Scale Breaches Sweep U.S. and Global Targets, Sparking Data Governance Alarm

In early 2026 a cascade of cyber incidents stole up to ten petabytes of data from high‑profile organizations, including a 375‑terabyte breach at Lockheed Martin and a ransomware hit on PowerSchool that exposed 60 million children. The attacks have ignited a...

By Pulse
Ransomware-Linked ViperTunnel Malware Hits UK and US Businesses
NewsApr 14, 2026

Ransomware-Linked ViperTunnel Malware Hits UK and US Businesses

InfoGuard discovered a new Python‑based backdoor called ViperTunnel operating in UK and US enterprises. The malware disguises itself as a system DLL and leverages the sitecustomize.py module to execute code automatically, establishing a SOCKS5 proxy on port 443. Developed by the...

By HackRead
Microsoft Threat Intelligence Says AI Is Now a Core Tool for Cyber‑attackers
NewsApr 14, 2026

Microsoft Threat Intelligence Says AI Is Now a Core Tool for Cyber‑attackers

Microsoft Threat Intelligence released a report confirming that attackers are using generative AI across scouting, phishing, malware creation and infrastructure building, turning AI into a “force multiplier.” The finding spotlights a rapid shift in the threat landscape, with nation‑state groups...

By Pulse
Risk of Fraud and Disruption After Data Breach on Mexico Port Platform
NewsApr 14, 2026

Risk of Fraud and Disruption After Data Breach on Mexico Port Platform

A hacker from the Mexican group Sociedad Privada 157 breached the Ministry of the Navy’s Safe Smart Port (PIS) platform, exfiltrating 39.7 GB of data on roughly 640,000 logistics personnel. The compromised records include biometric identifiers, social security numbers, taxpayer IDs and...

By The Loadstar
Goldman Sachs ‘Hyperaware’ of AI Risks; Working with Anthropic on Mythos
NewsApr 14, 2026

Goldman Sachs ‘Hyperaware’ of AI Risks; Working with Anthropic on Mythos

Goldman Sachs warned that Anthropic’s new AI model, Mythos, can autonomously discover and exploit software vulnerabilities, raising serious cyber‑risk concerns for the financial sector. The bank’s CEO David Solomon said Goldman is "hyperaware" of these threats and is working with...

By The Cyber Express
InfoReg Raises Alarm as Data Breaches Hit 788 in Q1
NewsApr 14, 2026

InfoReg Raises Alarm as Data Breaches Hit 788 in Q1

South Africa’s Information Regulator recorded 788 data‑breach notifications in the first quarter, a sharp rise that includes high‑profile incidents at Standard Bank, Liberty Group and Statistics South Africa. The regulator, led by Advocate Pansy Tlakula, warned that many reports lack...

By ITWeb (South Africa) – Public Sector
Nightclub Giant RCI Hospitality Reports Data Breach
NewsApr 14, 2026

Nightclub Giant RCI Hospitality Reports Data Breach

RCI Hospitality Holdings, a leading adult nightclub operator, disclosed a data breach affecting its independent contractors. The breach stemmed from an insecure direct object reference (IDOR) vulnerability on an IIS web server discovered on March 23, with unauthorized access beginning March 19....

By SecurityWeek
Italtel, Quantum Bridge Partner to Protect Critical Communications
BlogApr 14, 2026

Italtel, Quantum Bridge Partner to Protect Critical Communications

Italian system integrator Italtel has formed a strategic partnership with Canadian quantum‑security specialist Quantum Bridge Technologies to deliver post‑quantum communication solutions worldwide. The collaboration aims to embed quantum‑safe encryption into existing network infrastructures, targeting telecom operators, enterprises, and critical‑infrastructure owners....

By TelecomDrive
AI Security Institute Advocates Security Best Practices After Mythos Test
NewsApr 14, 2026

AI Security Institute Advocates Security Best Practices After Mythos Test

The AI Security Institute (AISI) evaluated Anthropic’s Claude Mythos Preview, finding it could autonomously execute multi‑stage attacks and complete 22 of 32 steps in a simulated corporate network. The model succeeded in three out of ten attempts, highlighting both its...

By Infosecurity Magazine
Germany Complains About Hybrid Attacks
NewsApr 14, 2026

Germany Complains About Hybrid Attacks

Germany’s defence ministry warned that hybrid attacks are targeting the country’s critical infrastructure and Bundeswehr units deployed abroad. Vice Admiral Thomas Daum said soldiers in Lithuania suspect phone‑call interception and disinformation campaigns, while citing drone strikes, espionage and sabotage of data...

By Defence24 (Poland)
The Mythos Threat: Why Treasurers Must Prepare for the AI Arms Race
NewsApr 14, 2026

The Mythos Threat: Why Treasurers Must Prepare for the AI Arms Race

Anthropic’s new Claude Mythos model can autonomously discover zero‑day vulnerabilities across major operating systems and browsers, turning a defensive AI tool into a potent offensive weapon. The capability has triggered emergency meetings between transatlantic regulators and the world’s largest banks,...

By The Global Treasurer
The AI Inflection Point: What Security Leaders Must Do Now
NewsApr 14, 2026

The AI Inflection Point: What Security Leaders Must Do Now

AI has moved from experiment to production in cybersecurity, forcing security leaders to treat it as an operating‑model shift rather than a bolt‑on tool. Threat reports show AI‑enabled adversaries accelerating attack timelines to under 30 minutes, outpacing human‑only triage. CISOs...

By CSO Online
108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users
NewsApr 14, 2026

108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users

Security researchers have uncovered a coordinated campaign involving 108 malicious Chrome extensions that share a common command‑and‑control server. The extensions, published under five publisher names, have collectively been installed about 20,000 times and harvest Google OAuth credentials, Telegram Web session...

By The Hacker News
Cyber Risk Ratings Fade Out; Actionable Intelligence Takes The Spotlight
NewsApr 14, 2026

Cyber Risk Ratings Fade Out; Actionable Intelligence Takes The Spotlight

The Forrester Wave™ Q2 2026 shows cyber risk rating platforms losing influence as firms demand actionable intelligence. Vendors are re‑engineering solutions to serve third‑party risk management rather than merely delivering scores. AI capabilities remain nascent, with only a few providers showcasing...

By Forrester Blogs
Hackers Steal Healthcare Recruitment Data
NewsApr 14, 2026

Hackers Steal Healthcare Recruitment Data

Hackers identifying themselves as XP95 claim to have exfiltrated roughly half a million files from Healthdaq, a recruitment platform used by health trusts in Northern Ireland. The stolen data spans driving licences, criminal background checks, vaccine records, passports and other...

By Silicon UK
Curious About Quantum? Check Out Training Options From ISC2, IBM, AWS and More
NewsApr 14, 2026

Curious About Quantum? Check Out Training Options From ISC2, IBM, AWS and More

The quantum computing sector is accelerating toward a so‑called Q‑day, projected by Forrester to arrive by 2030, as vendors move from theoretical fault‑tolerant designs to early engineering reality. IBM targets fault‑tolerant quantum processors by 2029, while industry leaders warn that...

By Network World
Too Many False Alerts Kill Trust and Attention
SocialApr 14, 2026

Too Many False Alerts Kill Trust and Attention

The Law of False Alerts: “As the rate of erroneous alerts increases, operator reliance, or belief, in subsequent warnings decreases.” Too many alerts and people stop reading them. Too many false positives and people stop trusting them.

By Tom Johnson
Hackers Exploit Kali Forms Vulnerability to Take Over WordPress Sites
NewsApr 14, 2026

Hackers Exploit Kali Forms Vulnerability to Take Over WordPress Sites

A critical Remote Code Execution (RCE) flaw was discovered in the Kali Forms WordPress plugin, which powers over 10,000 active sites. The vulnerability, reported on March 2, 2026, was patched in version 2.4.10 on March 20, 2026, but attackers began exploiting it the same day,...

By The Cyber Express
Research Bits: Apr. 14
NewsApr 14, 2026

Research Bits: Apr. 14

Researchers from Hong Kong, Tsinghua and Southern University of Science and Technology unveiled CLAP, a memristor‑based platform that fuses physically unclonable function authentication with compute‑in‑memory, achieving 99.46% AUC on ECG data while shrinking area and power use. A separate team...

By Semiconductor Engineering
China Leads State‑Sponsored Cyberattacks on U.S.,
SocialApr 14, 2026

China Leads State‑Sponsored Cyberattacks on U.S.,

"The United States is China’s #1 target for Cyberattacks. From 2000-2023, China was responsible for 240 statesponsored or state-affiliated cyberattacks, followed by Russia at 158 and Iran at 102." Great note from the always brilliant Michael Cembalest on the economic...

By Trevor Noren
AI Is Simplifying Online Crime, Danger Escalates
SocialApr 14, 2026

AI Is Simplifying Online Crime, Danger Escalates

AI is already making online crimes easier. It could get much worse. | MIT Technology Review https://t.co/OOi3OhIPMa

By Chuck Brooks
Booking.com Suffers Data Breach, Leaves Guests’ Personal Details Exposed
NewsApr 14, 2026

Booking.com Suffers Data Breach, Leaves Guests’ Personal Details Exposed

Booking.com confirmed a data breach that exposed guests' names, emails, phone numbers and reservation details, though financial information remained untouched. The company has not disclosed the number of affected customers, prompting heightened regulator scrutiny after a 2018 breach that resulted...

By IndianTelevision.com
Evaluating Trust, ROI, and Risks of Anthropic's Security Model
SocialApr 14, 2026

Evaluating Trust, ROI, and Risks of Anthropic's Security Model

Mythos ~ Anthropic released a new model they claim is scary good at finding security vulnerabilities. What questions should we be asking? No hot take. Just pondering how we can trust a model, the ROI, and how we can evaluate the...

By Teri Radichel
Generative AI Now Finds Zero-Day Vulnerabilities, Prediction Proven
SocialApr 14, 2026

Generative AI Now Finds Zero-Day Vulnerabilities, Prediction Proven

Three years ago, I said in my talks that generative AI would eventually start discovering zero-day vulnerabilities. At the time, many people dismissed the idea as unrealistic. It is no longer unrealistic. https://t.co/Xrh5MjNmuA

By Mikko Hypponen