Know What's Happening in Cybersecurity

Today's Cybersecurity Pulse

Anthropic CEO meets White House over federal access to Mythos AI

Anthropic CEO Dario Amodei will meet White House chief of staff Susie Wiles to discuss government access to the company's Mythos AI model, which can discover and exploit zero‑day vulnerabilities. The meeting follows a Pentagon‑imposed blacklist after Amodei refused to lift safety restrictions, while Treasury, intelligence agencies and CISA are already testing the model.

AI Supercharges Scams as ASIC Hits Record Takedowns
NewsApr 9, 2026

AI Supercharges Scams as ASIC Hits Record Takedowns

Australia’s securities regulator ASIC dismantled a record 11,964 phishing and investment‑scam websites in 2025, a 90% jump from the 6,270 sites removed in 2024. The surge coincides with scammers exploiting artificial‑intelligence tools to craft more convincing fraud content. Despite the...

By Fintech Global
The Alleged Breach of China’s National Supercomputing Center Can Have Serious Geopolitical Consequences
BlogApr 9, 2026

The Alleged Breach of China’s National Supercomputing Center Can Have Serious Geopolitical Consequences

A hacker group called FlamingChina claims to have exfiltrated more than 10 petabytes of classified military, aerospace and scientific data from China’s National Supercomputing Center in Tianjin. The breach allegedly lasted six months, using a compromised VPN and a botnet to...

By Security Affairs
Signature Healthcare Cyberattack Causes Service Disruptions, Treatment Delays
NewsApr 9, 2026

Signature Healthcare Cyberattack Causes Service Disruptions, Treatment Delays

Signature Healthcare detected a cyberattack on April 6, 2026, prompting the network to shift to emergency downtime procedures. The breach forced the Brockton Hospital to divert ambulances, cancel chemotherapy infusions, and rely on manual workflows, while surgeries and urgent care continued...

By The Cyber Express
Use of Unauthorised AI Sparks Security and Compliance Concerns for Businesses
NewsApr 9, 2026

Use of Unauthorised AI Sparks Security and Compliance Concerns for Businesses

Two thirds of UK business leaders worry about data security and compliance risks from employees' unauthorised AI use, according to a Studio Graphene‑commissioned poll of 500 senior managers. The survey found 48% suspect shadow AI tools are in use, rising...

By Workplace Insight
Keeper Security Expands PAM Browser Isolation to Support Advanced Web Browsing Workflows
BlogApr 9, 2026

Keeper Security Expands PAM Browser Isolation to Support Advanced Web Browsing Workflows

Keeper Security has upgraded its Remote Browser Isolation (RBI) within KeeperPAM, adding multi‑tab browsing, full JavaScript support, and administrator‑controlled file uploads. The enhancements also extend KeeperAI‑powered session monitoring to RBI, enabling real‑time anomaly detection across privileged sessions. These changes aim...

By IT Security Guru
Patch Windows Collapse as Time-to-Exploit Accelerates
NewsApr 9, 2026

Patch Windows Collapse as Time-to-Exploit Accelerates

Rapid7’s 2026 Threat Landscape Report shows confirmed exploitation of high‑ and critical‑severity vulnerabilities more than doubled, rising to 146 incidents in 2025 from 71 in 2024. The median time from public disclosure to inclusion in CISA’s Known Exploited Vulnerabilities list...

By CSO Online
Mobile App Security with Ryan Lloyd
PodcastApr 9, 202654 min

Mobile App Security with Ryan Lloyd

In this episode, Ryan Lloyd, Chief Product Officer at GuardSquare, explains how mobile app security differs from desktop and web security, emphasizing that critical logic and IP reside on users' devices, making them prime targets for reverse engineering, tampering, and...

By Software Engineering Daily – Data
Adobe Reader Zero-Day Exploited for Months: Researcher
NewsApr 9, 2026

Adobe Reader Zero-Day Exploited for Months: Researcher

A researcher has identified an actively exploited zero‑day vulnerability in Adobe Reader, discovered through a malicious PDF that can harvest system data and may enable remote code execution or sandbox escape. The exploit has been observed in the wild since...

By SecurityWeek
Google Warns of New Threat Group Targeting BPOs and Helpdesks
NewsApr 9, 2026

Google Warns of New Threat Group Targeting BPOs and Helpdesks

Google’s Threat Intelligence Group has identified a new financially motivated threat cluster, UNC6783, targeting business process outsourcers and enterprise helpdesks. The group leverages live‑chat interactions to direct victims to spoofed Okta login pages and malicious Zendesk‑support domains, stealing clipboard data...

By Infosecurity Magazine
68% of Banks Increase Fraud Defense Spending as Account Takeovers Spike
NewsApr 9, 2026

68% of Banks Increase Fraud Defense Spending as Account Takeovers Spike

Banks are rapidly reclassifying fraud defense from a reactive cost center to core infrastructure, driven by a surge in account‑takeover attacks. The PYMNTS 2025 State of Fraud report shows unauthorized‑party fraud now represents 71% of incidents and losses, pushing average...

By PYMNTS
Voltage Fault Injection: The Physical Hack That Breaks Open-Source Bitcoin Hardware.
BlogApr 9, 2026

Voltage Fault Injection: The Physical Hack That Breaks Open-Source Bitcoin Hardware.

The post reveals that voltage fault injection—a laboratory‑grade physical attack—can compromise 100% open‑source Bitcoin hardware wallets by directly manipulating silicon to bypass PIN protection. Even devices with transparent firmware like Trezor or Blockstream Jade are vulnerable when an adversary gains...

By In Bitcoin We Trust Newsletter
CLEAR1 Achieves FedRAMP® ‘In Process’ Designation to Support Public Sector and Regulated Industries
NewsApr 9, 2026

CLEAR1 Achieves FedRAMP® ‘In Process’ Designation to Support Public Sector and Regulated Industries

CLEAR 1, the secure identity platform of CLEAR (NYSE: YOU), has earned a FedRAMP Moderate “In Process” designation and is now listed on the FedRAMP Marketplace. The milestone builds on CLEAR’s contract with CMS to modernize Medicare.gov identity verification and signals...

By Airport Industry-News
Vibe Coding Is the New Shadow IT
NewsApr 9, 2026

Vibe Coding Is the New Shadow IT

Generative AI has turned shadow IT into "vibe coding," where employees create applications using natural‑language prompts. While the approach accelerates prototyping and lets non‑developers build tools, the resulting code often lacks testing, security reviews, and documentation. Enterprises face rogue apps...

By Gestalt IT
When Your Legal Tech Vendor Gets Breached: DocketWise Incident Exposes 116,666 Immigration Records and a Profession’s Blind Spot
BlogApr 9, 2026

When Your Legal Tech Vendor Gets Breached: DocketWise Incident Exposes 116,666 Immigration Records and a Profession’s Blind Spot

DocketWise, a cloud‑based immigration case‑management platform, suffered a supply‑chain breach that exposed the personal records of 116,666 individuals, including Social Security numbers, passports, medical data and attorney‑client communications. The intrusion began in September 2025, was detected in October, confirmed in...

By Legal Tech Daily
Quantum-Safe Email: S/MIME and Post-Quantum Email Security
NewsApr 9, 2026

Quantum-Safe Email: S/MIME and Post-Quantum Email Security

The article warns that today’s S/MIME email encryption, built on RSA and ECC, will become vulnerable once practical quantum computers arrive. Quantum algorithms like Shor’s could crack RSA‑2048 in hours, exposing corporate contracts, financial data, and intellectual property. The U.S....

By Security Boulevard
Bitcoin Depot Discloses $3.6 Million Crypto Theft Following System Breach
NewsApr 9, 2026

Bitcoin Depot Discloses $3.6 Million Crypto Theft Following System Breach

Bitcoin Depot disclosed that on March 23, 2026 attackers siphoned 50.903 Bitcoin, roughly $3.665 million, from its internal settlement wallets after breaching corporate IT systems. The breach was limited to internal credentials and did not affect customer‑facing platforms or data. Bitcoin...

By The Cyber Express
Internet-Exposed ICS Devices Raise Alarm for Critical Sectors
BlogApr 9, 2026

Internet-Exposed ICS Devices Raise Alarm for Critical Sectors

A recent comparative study scanned the internet for Modbus‑exposed industrial control system (ICS) devices and identified 179 likely live units, with the United States accounting for 57 of them. The research highlights that many of these devices run legacy protocols...

By Security Affairs
Kenya’s Cyber Threats Surge 441% in Three Months as Defence Gap Widens
NewsApr 9, 2026

Kenya’s Cyber Threats Surge 441% in Three Months as Defence Gap Widens

Kenya’s Computer Incident Response Centre reported a 441% jump in cyber threat events, reaching 4.6 billion incidents in the fourth quarter of 2025 – the sharpest rise in at least three years. Distributed Denial‑of‑Service attacks exploded by 1,117% quarter‑on‑quarter, yet advisory...

By TechCabal
DRAM’s Whac‑A‑Mole Security Crisis
NewsApr 9, 2026

DRAM’s Whac‑A‑Mole Security Crisis

Rowhammer remains a pervasive DRAM security flaw, and a newer variant called Rowpress is emerging as a complementary threat. Memory manufacturers have introduced refresh‑management commands—RFM, ARFM and DRFM—to target vulnerable rows, yet these mitigations are imperfect and can be weaponized....

By Semiconductor Engineering
Why Incident Response Has Become a Core Responsibility for MSPs
NewsApr 9, 2026

Why Incident Response Has Become a Core Responsibility for MSPs

Recent high‑profile cyber breaches in the UK have highlighted that many organizations are unprepared for the aftermath of an intrusion. While technical safeguards remain essential, customers now judge managed service providers (MSPs) on their ability to execute a robust incident...

By ITPro
Quantum Computers and Post-Quantum Security
NewsApr 9, 2026

Quantum Computers and Post-Quantum Security

Swiss financial infrastructure operator SIX is accelerating its shift to post‑quantum cryptography as quantum computers threaten current asymmetric encryption. The firm has launched a comprehensive crypto‑inventory, built crypto‑agility into its systems, and begun hybrid testing of NIST‑standardized PQC algorithms. By...

By SIX Swiss Exchange – ETFs (news/resources)
Your MCP Server Is a Resource Server Now. Act Like It.
NewsApr 9, 2026

Your MCP Server Is a Resource Server Now. Act Like It.

The March 26 2025 revision of the MCP specification reclassifies MCP servers as OAuth 2.0 resource servers, demanding a formal identity layer. The article walks through building an identity gateway that uses Keycloak, Maverics, OPA policies, and RFC 8693 token‑exchange to give Claude‑style AI...

By Security Boulevard
$3.6 Million Stolen in Bitcoin Depot Hack
NewsApr 9, 2026

$3.6 Million Stolen in Bitcoin Depot Hack

Bitcoin Depot, the largest U.S. Bitcoin ATM operator, disclosed that hackers stole roughly 50.903 BTC, valued at about $3.6 million, after breaching its corporate IT systems on March 23. The company says the intrusion was limited to internal wallets and did not affect...

By SecurityWeek
NCSC Warns of Russian Cyber Hijack Threat
NewsApr 9, 2026

NCSC Warns of Russian Cyber Hijack Threat

The UK National Cyber Security Centre (NCSC) warned that Russian state‑linked group APT28 is hijacking popular routers such as TP‑Link and MikroTik to reroute internet traffic through malicious DNS servers. By compromising these devices, the group conducts man‑in‑the‑middle attacks that...

By UKAuthority (UK)
AI Agent Intent Is a Starting Point, Not a Security Strategy
NewsApr 9, 2026

AI Agent Intent Is a Starting Point, Not a Security Strategy

Token Security’s research reveals that 65% of agentic chatbots retain live access credentials despite never being used, and 51% of their external actions depend on hard‑coded keys. The study highlights how AI agents are treated as disposable experiments, creating orphaned...

By Help Net Security
Asqav: Open-Source SDK for AI Agent Governance
NewsApr 9, 2026

Asqav: Open-Source SDK for AI Agent Governance

Asqav is an open‑source Python SDK that cryptographically signs every autonomous AI agent action using the quantum‑safe ML‑DSA‑65 algorithm and links entries in a tamper‑evident hash chain. The toolkit integrates with five popular agent frameworks—including LangChain and OpenAI Agents—and offers...

By Help Net Security
When “Opportunity” Knocks, Don’t Answer.
PodcastApr 9, 202649 min

When “Opportunity” Knocks, Don’t Answer.

In this episode of Hacking Humans, Dave, Joe, and Maria dissect two major social‑engineering threats: a LinkedIn‑based phishing campaign that uses urgent “business opportunity” emails and look‑alike login pages to harvest credentials, and a $20 million Everest‑guide scam where climbers are...

By Hacking Humans
Hong Kong Police Arrest Man Suspected of Stealing 56,000 Hospital Authority Patients’ Personal Data
NewsApr 9, 2026

Hong Kong Police Arrest Man Suspected of Stealing 56,000 Hospital Authority Patients’ Personal Data

Hong Kong police arrested a 30‑year‑old contractor employee suspected of downloading personal data of more than 56,000 Hospital Authority patients. The breach, traced to two contractor offices in the New Territories, involved surgical‑procedure details but not full medical records. Authorities...

By Hong Kong Free Press – News (Finance/Business coverage)
Phishers Sneak Through Using GitHub and Jira’s Own Mail Delivery Infrastructure
NewsApr 9, 2026

Phishers Sneak Through Using GitHub and Jira’s Own Mail Delivery Infrastructure

Security researchers at Cisco Talos have uncovered a new phishing vector that hijacks the native notification systems of SaaS platforms such as GitHub and Atlassian Jira. By embedding malicious text in commit summaries or Jira project fields, attackers trigger automatic...

By Help Net Security
Prompt Injection Tags Along as GenAI Enters Daily Government Use
NewsApr 9, 2026

Prompt Injection Tags Along as GenAI Enters Daily Government Use

State and territorial governments are now using generative AI (GenAI) in everyday workflows, with 82% of CIOs reporting daily usage—a jump from 53% a year earlier. As adoption expands, the Center for Internet Security warns that prompt injection—malicious instructions hidden...

By Help Net Security
Do Not Be Surprised if LessWrong Gets Hacked
BlogApr 9, 2026

Do Not Be Surprised if LessWrong Gets Hacked

The LessWrong admin warns that the platform’s security posture favors speed over hardened protection, making it vulnerable to the wave of AI‑driven cyber attacks highlighted by Anthropic’s Mythos zero‑day disclosures. Users are urged not to store sensitive information such as...

By LessWrong
AusPost Warns of Growing Online Scam Threat
NewsApr 9, 2026

AusPost Warns of Growing Online Scam Threat

Australia Post warns that scams targeting sellers on online marketplaces have surged, with more than 2,500 reports this year. Fraudsters pose as buyers on platforms like Facebook Marketplace, sending fake QR codes or links that mimic Australia Post’s courier service...

By Inside Retail Australia
Quantum-Secure Satellite Communications and the Future of Protected Networks
NewsApr 9, 2026

Quantum-Secure Satellite Communications and the Future of Protected Networks

Quantum‑secure satellite communications are transitioning from concept to early service architecture, using quantum key distribution from orbit to protect high‑value links. Government programs such as ESA’s SAGA, the QKDSat‑Redwire partnership, and Canada’s QEYSSat illustrate strategic investment driven by sovereignty and...

By New Space Economy
What’s A Law Firm to Do when Client Files Leak on the Dark Web
BlogApr 9, 2026

What’s A Law Firm to Do when Client Files Leak on the Dark Web

Law firms are confronting a new wave of data breaches where attackers exfiltrate entire client files and publish them on the dark web. The leaks often include sealed court filings and privileged communications, magnifying legal and reputational risks. Drawing on...

By beSpacific
Cloudflare Sets 2029 Goal for Full Post‑Quantum Security Across All Services
NewsApr 9, 2026

Cloudflare Sets 2029 Goal for Full Post‑Quantum Security Across All Services

Cloudflare announced it will achieve full post‑quantum security, including authentication, by 2029 after recent quantum‑computing breakthroughs. The move comes as the company sees over 65% of traffic already using post‑quantum encryption and as cybersecurity spending is projected to hit $320 billion...

By Pulse
SANS Stormcast Thursday, April 9th, 2026: Honeypot Fingerprinting; Microsoft Locks Developer Accounts; ActiveMQ Vuln;
PodcastApr 9, 20267 min

SANS Stormcast Thursday, April 9th, 2026: Honeypot Fingerprinting; Microsoft Locks Developer Accounts; ActiveMQ Vuln;

In this 7‑minute Stormcast episode, Johannes Ulrich discusses three security topics: attackers fingerprinting medium‑interaction honeypots by using obvious usernames like "honeypot" to confirm they’re not real systems; Microsoft’s recent suspension of developer accounts for privacy‑focused projects such as WireGuard, Veracrypt,...

By SANS Internet StormCast
Shaky Ceasefire Unlikely to Stop Cyberattacks From Iran-Linked Hackers for Long
NewsApr 9, 2026

Shaky Ceasefire Unlikely to Stop Cyberattacks From Iran-Linked Hackers for Long

A tentative cease‑fire between Iran, the United States and Israel is unlikely to halt cyber attacks from Iran‑linked groups. Pro‑Iranian hacktivist collective Handala announced it will pause attacks on U.S. targets but continue striking Israel, warning it will resume U.S....

By SecurityWeek
Fake QR Codes Make for Easy Scams – Be Careful What You Scan Out There
NewsApr 9, 2026

Fake QR Codes Make for Easy Scams – Be Careful What You Scan Out There

QR codes have become ubiquitous for payments, menus, and transport, but their convenience also makes them a prime vector for scams. Cybercriminals employ "quishing"—QR‑based phishing—to redirect users to counterfeit login or payment sites, often by overlaying fake stickers on legitimate...

By The Conversation – Business + Economy (US)
Russia's Forest Blizzard Nabs Rafts of Logins Via SOHO Routers
NewsApr 9, 2026

Russia's Forest Blizzard Nabs Rafts of Logins Via SOHO Routers

Russian GRU‑backed APT28, also known as Fancy Bear, has been exploiting long‑standing bugs in consumer‑grade SOHO routers such as MikroTik and TP‑Link to intercept web traffic worldwide. By reconfiguring DNS settings on compromised devices, the group silently siphons email credentials and...

By Dark Reading
Mythos Brings Scalable Security, Not Full VM Replacement
SocialApr 9, 2026

Mythos Brings Scalable Security, Not Full VM Replacement

I’m excited about Mythos. We have been asking for scale in security for years and we are getting glimpses of it. I sincerely doubt it will replace all of vulnerability management or vulnerability research but it probably will do a...

By Jason Haddix
Use Android to Detect Hidden AirTag Trackers
SocialApr 9, 2026

Use Android to Detect Hidden AirTag Trackers

Are you concerned that you might have an unknown tracking device like an Apple AirTag tucked into your car or luggage? It's possible, unfortunately. The good news is that your Android phone can help you find it. Here's how: https://t.co/uAmYvBznkv...

By Dave Taylor
Stateless Hash-Based Signatures for AI Model Weight Integrity
NewsApr 9, 2026

Stateless Hash-Based Signatures for AI Model Weight Integrity

Enterprises deploying AI agents with Model Context Protocol (MCP) must test cryptographic safeguards in realistic cloud sandboxes. Simulating post‑quantum algorithms such as Kyber and Dilithium on high‑entropy instances reveals significant CPU and latency overhead, especially under heavy agent loads. Proper...

By Security Boulevard
Human Vulnerabilities Can't Be Pre‑patched; Bio Defense Lags Cyber
SocialApr 9, 2026

Human Vulnerabilities Can't Be Pre‑patched; Bio Defense Lags Cyber

With bio the problem is harder than with cyber. You can patch up vulnerabilities before anyone tries to attack them. Human vulnerabilities can't be patched up in advance; the "defense" always moves second.

By Noah Smith
Reset All Trading Passwords, Revisit in August
SocialApr 9, 2026

Reset All Trading Passwords, Revisit in August

So.... Change the passwords to all our trading and charting accounts and come back in August? 😅

By Nebraskan Gooner
OCR Releases Risk Management Video
NewsApr 9, 2026

OCR Releases Risk Management Video

The U.S. Department of Health and Human Services Office for Civil Rights (OCR) has released a new video that explains the HIPAA Security Rule’s risk‑management requirement. The presentation, led by senior cybersecurity advisor Nicholas Heesters, expands OCR’s earlier Risk Analysis...

By DataBreaches.net
AI May Aid Defenders, Yet Empower Attackers During Transition
SocialApr 9, 2026

AI May Aid Defenders, Yet Empower Attackers During Transition

Yes, I think in equilibrium, AI favors cyber defense, because an AI can go over all the code and find all the weak spots and patch them up. But in the transition period, it could favor the attacker, if AI-generated...

By Noah Smith
✨🛡️ The Mythos Opportunity: The Best Cyber-Firewall Is the One that Thinks
BlogApr 9, 2026

✨🛡️ The Mythos Opportunity: The Best Cyber-Firewall Is the One that Thinks

Anthropic introduced Mythos, an AI model that excels at discovering software vulnerabilities, but chose not to commercialize it. Instead, the firm gathered over 40 technology and finance companies into the Project Glasswing consortium to use Mythos for proactive bug hunting....

By Faster, Please! (Substack)
AskPayroll Launches AI‑powered Payroll Copilot, Promising Secure, Compliance‑focused Automation
NewsApr 9, 2026

AskPayroll Launches AI‑powered Payroll Copilot, Promising Secure, Compliance‑focused Automation

AskPayroll introduced its AI‑powered payroll copilot in beta today, offering a privacy‑first, compliance‑centric assistant built for Canadian payroll teams. The solution keeps all data within the client’s environment and is slated for a full launch in June 2026, positioning it...

By Pulse
The Free Ticket You Just Got Offered to Mumbrella360 Is Not Legitimate
NewsApr 9, 2026

The Free Ticket You Just Got Offered to Mumbrella360 Is Not Legitimate

Mumbrella has warned that a phishing email offering a free ticket to its Mumbrella360 conference is fake. The scam uses the sender name “The Mumbrella Team” and the address messaging-service@post.xero.com, with the subject line “Your Complimentary Mumbrella360 Ticket.” Recipients are...

By Mumbrella Australia