Know What's Happening in Cybersecurity

Today's Cybersecurity Pulse

Anthropic CEO meets White House over federal access to Mythos AI

Anthropic CEO Dario Amodei will meet White House chief of staff Susie Wiles to discuss government access to the company's Mythos AI model, which can discover and exploit zero‑day vulnerabilities. The meeting follows a Pentagon‑imposed blacklist after Amodei refused to lift safety restrictions, while Treasury, intelligence agencies and CISA are already testing the model.

Hackers Steal and Leak Sensitive LAPD Police Documents
NewsApr 8, 2026

Hackers Steal and Leak Sensitive LAPD Police Documents

Hackers infiltrated the Los Angeles Police Department’s internal network and exfiltrated thousands of sensitive files, including officer personnel records, internal‑affairs investigations, and unredacted discovery documents. The data was posted online by the Distributed Denial of Secrets platform, which identified the...

By DataBreaches.net
ComfyUI Instances Hijacked for Cryptomining and Proxy Botnet
NewsApr 8, 2026

ComfyUI Instances Hijacked for Cryptomining and Proxy Botnet

A new campaign is hijacking publicly exposed ComfyUI instances—an open‑source UI for stable diffusion models—to run illicit cryptocurrency mining and proxy botnet operations. Threat actors scan cloud IP ranges with a custom Python tool, exploiting unauthenticated deployments to execute malicious...

By SC Media
Synthetic Identities And Malicious Bots Boost Fraud Attacks, LexisNexis Says
NewsApr 8, 2026

Synthetic Identities And Malicious Bots Boost Fraud Attacks, LexisNexis Says

LexisNexis Risk Solutions reports synthetic‑identity fraud as the fastest‑growing fraud type in 2025, representing 11% of global fraud—a rise eight‑fold from 2024. The surge is driven by criminals using generative AI to craft realistic identities, especially in Latin America, which...

By Digital Transactions
Coding Agents Enable Cheaper, Faster Software Hardening
SocialApr 8, 2026

Coding Agents Enable Cheaper, Faster Software Hardening

"I think we’re going to see a lot more reimaginings, where people attack old problems with modern tactics. Coding agents lower the costs of taking on stalwarts and raise our ability to rapidly harden our software." https://t.co/rDAftsXXKe < I like...

By Richard Seroter
Telenor Facing Legal Action over Myanmar Claims
NewsApr 8, 2026

Telenor Facing Legal Action over Myanmar Claims

Telenor is facing a Norwegian class‑action lawsuit filed by the Justice and Accountability Initiative on behalf of Myanmar customers, accusing the telecom of handing over user data and surveillance technology to the military junta. The suit alleges that at least...

By Mobile World Live
Telenor Sued Over Claims It Exposed Myanmar Customers to Junta Repression
NewsApr 8, 2026

Telenor Sued Over Claims It Exposed Myanmar Customers to Junta Repression

A Swedish non‑profit has filed a class‑action lawsuit in Norway on behalf of more than 1,200 Myanmar citizens whose call‑log and location data were allegedly handed to the military junta by Telenor’s local subsidiary. The complaint seeks €9,000 (about $10,500)...

By Claims Journal
Quantum Threat Looms: Upgrade Cybersecurity Now
SocialApr 8, 2026

Quantum Threat Looms: Upgrade Cybersecurity Now

Quantum computing is coming. And it will challenge current cybersecurity. Even if quantum-ready machines are 5–10 years out, moving to quantum-safe systems can’t wait. https://t.co/WhtoSQvyc4

By Cristina Dolan
Aztec - Privacy as a Native Execution Layer
BlogApr 8, 2026

Aztec - Privacy as a Native Execution Layer

Aztec unveiled its Alpha Network on March 31, 2026, a Layer‑2 solution that embeds private execution, identity, and data directly into the contract layer using its Noir programming language. The network enables developers to label functions as public or private,...

By Alea Research
Stopping Remote Support Ransomware Footholds Before Attack
SocialApr 8, 2026

Stopping Remote Support Ransomware Footholds Before Attack

Great post here and read from @Binary_Defense and a real-life story and breach we prevented at a customer. Remote Support to Ransomware Foothold: Stopping a Pre-Ransomware Intrusion https://t.co/xUGW63zCeL #BinaryDefense

By Dave Kennedy
Timor-Leste Is Vulnerable to ‘Infiltration by Foreign Organized Crime’, President José Ramos-Horta Says
NewsApr 8, 2026

Timor-Leste Is Vulnerable to ‘Infiltration by Foreign Organized Crime’, President José Ramos-Horta Says

Timor‑Leste’s president José Ramos‑Horta warned that the island nation is vulnerable to infiltration by foreign organized crime. Australian Federal Police have deployed digital‑forensics and cyber experts to help local law enforcement after a December 2025 visit. A joint Guardian‑OCCRP investigation linked...

By The Guardian – Asia Pacific
Most CISOs Ignore Mythos Alerts; Threats Arrive Within Nine Months
SocialApr 8, 2026

Most CISOs Ignore Mythos Alerts; Threats Arrive Within Nine Months

Curious how many large organization CISO offices have taken the Mythos red team reports as the red alert that it is. (I suspect very few) Based on historical trends in AI they have, at most, about six to nine months until...

By Ethan Mollick
Latest $285M Crypto Hack Suggests Next Major Exploit Could Come From ‘Compromised’ Developers
NewsApr 8, 2026

Latest $285M Crypto Hack Suggests Next Major Exploit Could Come From ‘Compromised’ Developers

On April 1, Drift Protocol halted deposits after a coordinated attack that siphoned roughly $285 million in a 12‑minute drain. investigators linked the breach to the same actors behind the October 2024 Radiant Capital hack, identifying a social‑engineering campaign that compromised multisig signers...

By CryptoSlate
Alarm in Health Service over Palantir Staff Being Given NHS Email Accounts
NewsApr 8, 2026

Alarm in Health Service over Palantir Staff Being Given NHS Email Accounts

Health service staff are alarmed after Palantir engineers were given NHS.net email accounts, granting them access to a directory of up to 1.5 million NHS employees. The access accompanies Palantir's £300 million ($380 million) contract to deliver its Federated Data Platform, which promises...

By The Guardian AI
Sensitive LAPD Materials, Including Officer Personnel Files, Leaked in Suspected Hack
NewsApr 8, 2026

Sensitive LAPD Materials, Including Officer Personnel Files, Leaked in Suspected Hack

A suspected hack of the Los Angeles city attorney’s office exposed a massive trove of LAPD records, including officer personnel files and Internal Affairs investigation documents. Approximately 7.7 terabytes of data and more than 337,000 files were made available for download,...

By Police1 – Daily News
Pluralsight Launches SecureReady to Help Organizations Build Job-Ready Cybersecurity Teams
NewsApr 8, 2026

Pluralsight Launches SecureReady to Help Organizations Build Job-Ready Cybersecurity Teams

Pluralsight unveiled SecureReady, an end‑to‑end cybersecurity skill development platform aimed at closing talent gaps for CISOs and IT leaders. The solution pairs a constantly refreshed library of on‑demand courses with more than 350 hands‑on labs and expert‑led seminars, releasing new...

By Dark Reading
Is a $30,000 GPU Good at Password Cracking?
NewsApr 8, 2026

Is a $30,000 GPU Good at Password Cracking?

The article tests whether a $30,000 AI‑grade GPU can outpace a high‑end consumer card in password cracking. Using Hashcat, Specops benchmarked Nvidia's H200, AMD's MI300X, and the RTX 5090 across MD5, NTLM, bcrypt, SHA‑256 and SHA‑512 hashes. The RTX 5090 consistently delivered...

By BleepingComputer
Content Security Policy Drift in Salesforce Lightning: Engineering Stable Embedded Integration Boundaries
NewsApr 8, 2026

Content Security Policy Drift in Salesforce Lightning: Engineering Stable Embedded Integration Boundaries

Salesforce Lightning embeds external CTI frames via iframes that depend on Content Security Policy (CSP) settings. Because CSP is evaluated at runtime, any change in the external vendor’s CDN or redirect path can cause the frame to be blocked, even...

By DZone – DevOps & CI/CD
Microsoft Abruptly Terminates VeraCrypt Account, Halting Windows Updates
NewsApr 8, 2026

Microsoft Abruptly Terminates VeraCrypt Account, Halting Windows Updates

Microsoft abruptly terminated the account VeraCrypt’s developer, Mounir Idrassi, used to sign Windows drivers and bootloaders, leaving the project unable to publish Windows updates. Idrassi received only a generic verification‑failure notice and no prior warning, despite the account being active...

By 404 Media
Prepare Now: Inventory, Automate Patching, Build Playbooks, Review Insurance
SocialApr 8, 2026

Prepare Now: Inventory, Automate Patching, Build Playbooks, Review Insurance

What to do NOW to get ready for the influx of #AI security risks 1. Document your entire inventory/topology 2. Build automation for patching and updates 3. Create incident playbooks - engage legal, train leadership and customer facing teams 4. Review insurance...

By Meg Bear
APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies
NewsApr 8, 2026

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

Russian state‑linked group APT28 has launched a spear‑phishing campaign that deploys a new malware suite called PRISMEX. The operation, active since September 2025, exploits freshly disclosed zero‑days CVE‑2026‑21509 and CVE‑2026‑21513 to infiltrate Ukrainian government agencies, logistics firms and NATO‑affiliated entities. PRISMEX...

By The Hacker News
Iranian Threat Actors Disrupt US Critical Infrastructure Via Exposed PLCs
NewsApr 8, 2026

Iranian Threat Actors Disrupt US Critical Infrastructure Via Exposed PLCs

Iran‑affiliated advanced persistent threat actors have begun disrupting U.S. critical infrastructure by exploiting internet‑exposed programmable logic controllers, especially Rockwell Automation/Allen‑Bradley devices. The campaign, launched after a U.S.–Israel strike on Iran, manipulates PLC project files and SCADA displays, causing operational downtime...

By Dark Reading
API Security Risks Rise as AI Adoption Accelerates
NewsApr 8, 2026

API Security Risks Rise as AI Adoption Accelerates

Enterprises accelerating AI and autonomous agents are exposing APIs as a critical attack vector, according to Salt Security’s first‑half 2026 report. Nearly half of organizations (47%) have paused AI rollouts over security concerns, while 32% reported API‑related incidents in the...

By eSecurity Planet
US Cyber Breach Costs Hit Record $10.2 Million as AI Accelerates Attack Timelines
NewsApr 8, 2026

US Cyber Breach Costs Hit Record $10.2 Million as AI Accelerates Attack Timelines

The 2026 Chubb Cyber Claims Report shows U.S. data‑breach costs soaring to $10.2 million on average in 2025, more than twice the global figure. AI‑powered malware now compromises networks in minutes, while AI‑driven defenses have kept incident frequency steady in some...

By Risk & Insurance
Behind the Investment: Linx
NewsApr 8, 2026

Behind the Investment: Linx

Linx Security announced a $50 million Series B round led by Insight Partners, Index Ventures and Cyberstarts. The AI‑native identity governance platform tackles the growing gap between human users and non‑human identities such as service accounts and AI agents. By leveraging an...

By Insight Partners (Insights)
10 ChatGPT Prompts L1 SOC Analysts Can Use in Their Daily Work
NewsApr 8, 2026

10 ChatGPT Prompts L1 SOC Analysts Can Use in Their Daily Work

The article lists ten ready‑to‑use ChatGPT prompts that help Level‑1 SOC analysts automate repetitive tasks such as alert summarization, log analysis, triage checklist creation, case note drafting, and executive‑level reporting. Each prompt is designed to turn raw security data into...

By eSecurity Planet
Iowa AG Files Lawsuit Against Change Healthcare over 2024 Data Breach
NewsApr 8, 2026

Iowa AG Files Lawsuit Against Change Healthcare over 2024 Data Breach

Change Healthcare, a UnitedHealth Group subsidiary, faces a lawsuit filed by Iowa Attorney General Brenna Bird alleging violations of state consumer‑protection and data‑security laws. The suit stems from a February 2024 breach that went undetected for ten days, exposing Social...

By DataBreaches.net
The AI Model that Can Hack Anything, and Why You Can't Use It
BlogApr 8, 2026

The AI Model that Can Hack Anything, and Why You Can't Use It

Anthropic announced Claude Mythos Preview, a new AI model that can autonomously discover and exploit software vulnerabilities at unprecedented rates. In internal tests Mythos achieved over 84% successful exploit outcomes, dwarfing the 14% rate of its predecessor Opus 4.6 and finding...

By The AI Corner
Act-of-War Clauses Cloud Cyber Insurance Coverage
NewsApr 8, 2026

Act-of-War Clauses Cloud Cyber Insurance Coverage

Geopolitical tensions are prompting insurers to insert act‑of‑war exclusions into cyber policies, a provision traditionally used in homeowners and travel insurance. The language lags behind the rapid evolution of cyberwarfare, leaving companies uncertain whether state‑sponsored attacks are covered. Lawyers and...

By DataBreaches.net
Anthropic's Zero Day Machine "Mythos" Triggers Hype, Criticism
NewsApr 8, 2026

Anthropic's Zero Day Machine "Mythos" Triggers Hype, Criticism

Anthropic announced Mythos, an unreleased frontier model it says can automatically uncover zero‑day software vulnerabilities far beyond its Opus 4.6 system. The company claims the model’s potency is so high it cannot be released publicly yet. Critics argue the assertions lack...

By The Stack (TheStack.technology)
512,000 Lines of Leaked Code Reveal the Lock-In Strategy Coming for Your AI Stack
PodcastApr 8, 20260 min

512,000 Lines of Leaked Code Reveal the Lock-In Strategy Coming for Your AI Stack

The episode dives into the recent Anthropic Claude code leak, emphasizing that the most consequential element is the hidden "Conway" always‑on agent and its companion environment, Funway, rather than the raw source code. These components form a standalone agent platform...

By Nate’s Newsletter
When the Levee Breaks: Managing Cybersecurity Threats During Natural Disasters
NewsApr 8, 2026

When the Levee Breaks: Managing Cybersecurity Threats During Natural Disasters

Utility firms face a surge in cyber threats when natural disasters strain resources and distract staff. Experts recommend year‑round phishing awareness, a unified monitoring dashboard, and automated behavioral alerts to keep attackers at bay. Robust incident and disaster response plans,...

By POWER Magazine
Quantum Computers Could Crack Bitcoin by 2030, Experts Warn
NewsApr 8, 2026

Quantum Computers Could Crack Bitcoin by 2030, Experts Warn

Google researchers and Nobel‑winning physicist John M. Martinis say a cryptographically‑relevant quantum computer could break Bitcoin's elliptic‑curve signatures within minutes, potentially as early as 2030. The findings revive a long‑standing debate over whether Bitcoin can upgrade to post‑quantum security before a...

By Pulse
Iran‑Linked Hackers Exploit Rockwell Automation PLCs, Disrupt U.S. Critical Infrastructure
NewsApr 8, 2026

Iran‑Linked Hackers Exploit Rockwell Automation PLCs, Disrupt U.S. Critical Infrastructure

Federal agencies including the FBI, CISA, NSA and DOE issued a joint advisory that Iranian‑affiliated advanced persistent threat actors are exploiting Rockwell Automation’s Allen‑Bradley programmable logic controllers. The activity has already caused operational disruptions and financial loss across energy, water,...

By Pulse
New Scam Alert: QR Codes Replace Links in Traffic Ticket Phishing
NewsApr 8, 2026

New Scam Alert: QR Codes Replace Links in Traffic Ticket Phishing

Cybercriminals are now using QR codes in traffic‑violation phishing scams. Scammers send fake “Notice of Default” letters that appear to come from state courts and urge recipients to scan a QR code to settle an alleged $6.99 fee. The QR...

By TechRepublic – Articles
Drift Protocol Exploit Remained Undetected for 21 Days
SocialApr 8, 2026

Drift Protocol Exploit Remained Undetected for 21 Days

The Drift Protocol exploiter was able to lie in wait for 21 days without triggering any alarms. 🥶 @omeragoldberg explains how 👇 https://t.co/LS7tFfc6AA

By Laura Shin
NERC Is ‘Actively Monitoring the Grid’ Following Iran-Linked Cyber Threat
NewsApr 8, 2026

NERC Is ‘Actively Monitoring the Grid’ Following Iran-Linked Cyber Threat

The Cybersecurity and Infrastructure Security Agency (CISA) warned that Iranian‑linked hackers are exploiting programmable logic controllers (PLCs) used in U.S. power, water and government facilities. The attacks manipulate software configurations and human‑machine interfaces, causing operational disruptions and potential financial loss....

By Utility Dive (Industry Dive)
From Bytecode to Bytes: Automated Magic Packet Generation
NewsApr 8, 2026

From Bytecode to Bytes: Automated Magic Packet Generation

Linux malware increasingly embeds malicious logic in classic Berkeley Packet Filter (BPF) programs, waiting for a precise "magic" packet to activate. Researchers demonstrated that symbolic execution with the Z3 theorem prover can automatically reverse‑engineer these filters and synthesize the triggering...

By Cloudflare Blog
NWN Adds Managed Security Services With MDR Partnership, Penetration Testing, vCISO
NewsApr 8, 2026

NWN Adds Managed Security Services With MDR Partnership, Penetration Testing, vCISO

NWN launched NWN Cybersecurity, a managed security services suite that combines in‑house penetration testing, vCISO, and MDR delivered through a partnership with Arctic Wolf. The offering integrates the AI‑driven Aurora Superintelligence platform and leverages existing Cisco and Palo Alto Networks relationships. NWN...

By CRN (US)
As Open Banking Fuels Interconnectivity, Privacy Matters More
NewsApr 8, 2026

As Open Banking Fuels Interconnectivity, Privacy Matters More

Open banking is deepening connections between traditional banks and fintech providers, intensifying the flow of consumer data. As data sharing grows, regulators and firms are under pressure to deliver clearer, plain‑language privacy disclosures that consumers can easily locate. Javelin Strategy’s...

By PaymentsJournal
AI Set to Revolutionize Hacking—Follow @Adversariel
SocialApr 8, 2026

AI Set to Revolutionize Hacking—Follow @Adversariel

If you want to understand how AI is about to completely change hacking, follow @adversariel.

By Will Knight
TikTok Plans Second Billion-Dollar Data Centre in Finland in Move to Store European User Data Locally
NewsApr 8, 2026

TikTok Plans Second Billion-Dollar Data Centre in Finland in Move to Store European User Data Locally

TikTok will spend €1 billion (about $1.16 billion) to build a second data centre in Lahti, Finland, adding to its European data‑sovereignty programme. The site will launch with 50 MW of power, scalable to 128 MW, and is slated for operation by 2027. The...

By Mint (LiveMint) – Companies
Modernising Governance: A Capability-Centric Approach to Legacy Mainframes
NewsApr 8, 2026

Modernising Governance: A Capability-Centric Approach to Legacy Mainframes

The article argues that traditional entitlement‑centric access governance for mainframe (z/OS) and IBM i systems fails because it abstracts away the business meaning of permissions. It proposes a capability‑centric model that defines access in terms of concrete business actions using...

By Identity Week
Who Really Runs Your VPN — and What that May Mean for Your Privacy
NewsApr 8, 2026

Who Really Runs Your VPN — and What that May Mean for Your Privacy

A new analysis of 50 VPN providers reveals that the majority rely on a handful of UK hosting firms—M247, Datacamp and CDN77—and rent space in data‑center buildings owned by US giants Equinix and Digital Realty. The study shows 73% of...

By DataBreaches.net
Russians Hijacking Routers for Cyber Spying
NewsApr 8, 2026

Russians Hijacking Routers for Cyber Spying

Russian GRU’s 85th Main Special Service Center has been hijacking vulnerable home routers, notably TP‑Link devices, since at least 2024 by exploiting CVE‑2023‑50224. The actors reconfigure DHCP/DNS settings to route traffic through their own resolvers, enabling man‑in‑the‑middle attacks that capture...

By DataBreaches.net
Data Privacy Challenges in HR Technology
BlogApr 8, 2026

Data Privacy Challenges in HR Technology

HR technology platforms are amassing employee data that persists far longer than needed, creating hidden privacy risks despite clean dashboards and compliance checklists. Integrations and metadata linking resurrect old complaints and personal details, often bypassing erasure requests. Internal access creep—managers,...

By HRTech Cube
A String of Radio Hijacks Exposes a Deeper Broadcast Weakness
NewsApr 8, 2026

A String of Radio Hijacks Exposes a Deeper Broadcast Weakness

A series of radio broadcast hijacks, including the recent intrusion at Michigan's 107.7 The Bay, reveal a growing vulnerability in studio‑to‑transmitter links. The FCC’s November notice confirmed that attackers are repeatedly compromising unsecured Barix audio equipment to replace legitimate programming...

By DataBreaches.net
NL: Dutch Healthcare Software Vendor Goes Dark After Ransomware Attack
NewsApr 8, 2026

NL: Dutch Healthcare Software Vendor Goes Dark After Ransomware Attack

ChipSoft, the leading Dutch provider of hospital patient‑record software, was hit by a ransomware attack that took its website offline on April 7. The breach affects roughly 80 percent of the Netherlands’ hospitals, potentially disrupting access to electronic health records. Officials have...

By DataBreaches.net
Tired of Targeted Ads? This Simple iPhone Fix Stops App Tracking in Seconds.
NewsApr 8, 2026

Tired of Targeted Ads? This Simple iPhone Fix Stops App Tracking in Seconds.

Apple’s App Tracking Transparency (ATT) lets iPhone users block apps from accessing the advertising identifier (IDFA) and other tracking data unless they explicitly grant permission. Users can disable tracking globally or per‑app via Settings > Privacy & Security > Tracking, turning targeted ads into generic ones....

By CNET (All)
Egnyte Introduces AI Safeguards as a New Layer of AI Security for Corporate Content
BlogApr 8, 2026

Egnyte Introduces AI Safeguards as a New Layer of AI Security for Corporate Content

Egnyte announced two major AI enhancements to its Content Cloud: AI Safeguards, a governance layer that lets IT and compliance teams control which users, groups, and files AI can access, and an AI Assistant that operates as a built‑in collaborator...

By StorageNewsletter