Know What's Happening in Cybersecurity

Today's Cybersecurity Pulse

Anthropic CEO meets White House over federal access to Mythos AI

Anthropic CEO Dario Amodei will meet White House chief of staff Susie Wiles to discuss government access to the company's Mythos AI model, which can discover and exploit zero‑day vulnerabilities. The meeting follows a Pentagon‑imposed blacklist after Amodei refused to lift safety restrictions, while Treasury, intelligence agencies and CISA are already testing the model.

He Was Laid Off, Posted on LinkedIn — Then Scammers Started Impersonating Real Recruiters to Target Him
NewsApr 17, 2026

He Was Laid Off, Posted on LinkedIn — Then Scammers Started Impersonating Real Recruiters to Target Him

Nick Russell posted his layoff from Epic Games on LinkedIn and was immediately swamped with recruiter messages, one of which turned out to be a scam. Cybercriminals are now hijacking real recruiters' LinkedIn profiles, referencing actual resumes and job openings,...

By Entrepreneur » Sales
Commercial AI Models Show Rapid Gains in Vulnerability Research
NewsApr 17, 2026

Commercial AI Models Show Rapid Gains in Vulnerability Research

Forescout’s Verde Labs reports that commercial AI models have closed the gap in vulnerability research, with all tested models now completing full research tasks and half generating working exploits autonomously. The most capable models, Claude Opus 4.6 and Kimi K2.5, can discover...

By Infosecurity Magazine
Capsule Security Raises $7 M to Guard AI Agents as New Privileged Users
NewsApr 17, 2026

Capsule Security Raises $7 M to Guard AI Agents as New Privileged Users

Capsule Security, a Tel‑Aviv‑based startup, closed a $7 million seed round led by Lama Partners and Forgepoint Capital International to launch a runtime‑security platform for AI agents. The funding targets a market where more than 80% of Fortune 500 firms now deploy...

By Pulse
Tuta Opens Closed Beta for Quantum‑Resistant Cloud Storage Platform
NewsApr 17, 2026

Tuta Opens Closed Beta for Quantum‑Resistant Cloud Storage Platform

Tuta announced a closed‑beta launch of Tuta Drive, a cloud storage service built with quantum‑safe cryptography, starting April 16. The invite‑only program gives early users end‑to‑end encrypted storage hosted in Germany, positioning the firm ahead of Google Drive and OneDrive...

By Pulse
OzCon Brings Real-World Attack Tactics to Kansas on May 18, 2026
NewsApr 17, 2026

OzCon Brings Real-World Attack Tactics to Kansas on May 18, 2026

OzCon, a one‑day cybersecurity conference, launches in Overland Park, Kansas on May 18, 2026, featuring live demonstrations of nation‑state tactics, physical and social engineering exploits, and a hands‑on Capture‑the‑Flag. Founder Renee Chronister says the event closes the gap between imagined...

By Pulse
Data Sharing: Is It Safe? Is It Secure? Everything You Need to Know
NewsApr 17, 2026

Data Sharing: Is It Safe? Is It Secure? Everything You Need to Know

Salesforce’s guide explains how SMBs can share data safely by using a unified CRM platform that enforces granular permissions and AI‑driven security checks. It cites that 51% of organizations saw a rise in cyber attacks in 2025, while 80% of...

By Salesforce Blog (Sales/CRM)
Coast Guard's New Cybersecurity Rules Offers Lessons for CISOs
NewsApr 17, 2026

Coast Guard's New Cybersecurity Rules Offers Lessons for CISOs

The U.S. Coast Guard has enacted its first mandatory cybersecurity framework for all U.S.-flagged vessels, ports and offshore facilities, with full compliance required by July 2027. Operators must create a cybersecurity plan, appoint a dedicated cybersecurity officer (CySO), conduct annual assessments...

By Dark Reading
Standard Bank Customer Data Leaked Online
NewsApr 17, 2026

Standard Bank Customer Data Leaked Online

Standard Bank disclosed that hackers have published a trove of customer data stolen in March, including names, ID numbers, contact details, bank account numbers and B‑BBEE classifications. The breach, claimed by the Rootboy group, involved roughly 1.2 TB of information but...

By Connecting Africa (Informa)
SEO Poisoning Attack Uses Microsoft Binary to Install RMM Tool
NewsApr 17, 2026

SEO Poisoning Attack Uses Microsoft Binary to Install RMM Tool

Researchers uncovered an SEO‑poisoning campaign that tricks users searching for the open‑source recovery tool TestDisk into downloading a trojanized installer. The fake installer is a Microsoft‑signed Setup binary that uses DLL sideloading to load a malicious autorun.dll, which then installs...

By GBHackers On Security
The Cyber Express Weekly Roundup: Crypto Breaches, State-Linked Schemes, and Platform Exploits
NewsApr 17, 2026

The Cyber Express Weekly Roundup: Crypto Breaches, State-Linked Schemes, and Platform Exploits

The Cyber Express weekly roundup highlighted a series of high‑profile cyber incidents. Grinex halted trading after a coordinated wallet breach that stole more than $15 million in USDT, while two U.S. citizens were sentenced for a North Korea‑linked scheme that generated...

By The Cyber Express
Brussels Launched an Age Checking App. It Took 2 Minutes to Hack It.
NewsApr 17, 2026

Brussels Launched an Age Checking App. It Took 2 Minutes to Hack It.

European Commission President Ursula von der Leyen unveiled a mobile age‑verification app intended to protect minors online. Within minutes, cybersecurity researchers demonstrated that the app could be hacked, exposing hard‑coded credentials and insecure data handling. The flaws raise serious privacy...

By DataBreaches.net
State to Audit Ohio School Districts’ Cybersecurity Plans
NewsApr 17, 2026

State to Audit Ohio School Districts’ Cybersecurity Plans

The Ohio Auditor of State will launch audits of school districts' cybersecurity programs in July, as mandated by House Bill 96. The legislation requires districts to establish policies that protect data, information technology, and related resources while ensuring availability, confidentiality,...

By DataBreaches.net
Oklahoma State Tax Commission Fails To Notice Data Breach for 18 Months
NewsApr 17, 2026

Oklahoma State Tax Commission Fails To Notice Data Breach for 18 Months

The Oklahoma Tax Commission (OTC) experienced a data breach that went undetected for 18 months, spanning from July 2024 to December 2025. Unauthorized actors accessed W‑2 and 1099 files through the agency’s online taxpayer portal, exposing personal information. The breach was only...

By DataBreaches.net
Northern Ireland School IT Systems ‘Largely Restored’ After Cyber Attack
NewsApr 17, 2026

Northern Ireland School IT Systems ‘Largely Restored’ After Cyber Attack

The Education Authority (EA) confirmed that the C2K network, which powers all IT services for Northern Ireland schools, has been largely restored after a cyber attack last week. The breach temporarily disabled online platforms, email, and learning management systems across...

By DataBreaches.net
Teen Arrested in Northern Ireland over Cyberattack on School Network
NewsApr 17, 2026

Teen Arrested in Northern Ireland over Cyberattack on School Network

A 16‑year‑old was arrested in Portadown, Northern Ireland, on suspicion of breaching the Computer Misuse Act after a cyberattack crippled the region’s school network. The intrusion blocked access to online learning platforms used by potentially hundreds of thousands of students,...

By DataBreaches.net
White House Moves to Give Federal Agencies Access to Anthropic’s Claude Mythos
NewsApr 17, 2026

White House Moves to Give Federal Agencies Access to Anthropic’s Claude Mythos

The White House Office of Management and Budget announced it is preparing to allow major federal agencies to use a modified version of Anthropic’s Claude Mythos AI model. Claude Mythos has demonstrated the ability to locate thousands of zero‑day vulnerabilities...

By CSO Online
Microsoft Closes Book on Rogue Windows Server 2025 Upgrades
NewsApr 17, 2026

Microsoft Closes Book on Rogue Windows Server 2025 Upgrades

Microsoft finally marked the rogue Windows Server 2025 upgrade as resolved after more than a year of disruption. The unintended upgrade, which auto‑installed on many servers in 2024, was mitigated with cumulative update KB5082063. However, that same patch introduced a new...

By The Register
Webinar: From Phishing to Fallout — Why MSPs Must Rethink Both Security and Recovery
NewsApr 17, 2026

Webinar: From Phishing to Fallout — Why MSPs Must Rethink Both Security and Recovery

BleepingComputer will host a live webinar on May 14, 2026 featuring Kaseya experts to discuss why managed service providers (MSPs) must align security and recovery strategies. The session highlights the rise of AI‑driven phishing, business‑email compromise, and targeted ransomware that...

By BleepingComputer
Team Cymru Launches Total Insights Feed to Replace Legacy Threat Intelligence Lists
NewsApr 17, 2026

Team Cymru Launches Total Insights Feed to Replace Legacy Threat Intelligence Lists

Team Cymru Inc. launched Total Insights Feed, a unified threat‑intelligence platform that replaces traditional indicator‑list feeds with machine‑actionable, scored data across the entire internet. The service evaluates over 57 million IP addresses and 400 million domains each day, assigning 0‑to‑100 risk scores...

By SiliconANGLE
In Other News: Satellite Cybersecurity Act, $90K Chrome Flaw, Teen Hacker Arrested
NewsApr 17, 2026

In Other News: Satellite Cybersecurity Act, $90K Chrome Flaw, Teen Hacker Arrested

The Senate advanced the bipartisan Satellite Cybersecurity Act of 2025, directing the Commerce Department to create a central hub for satellite security best practices as half of commercial satellite signals remain unencrypted. Law enforcement agencies dismantled the W3LL phishing‑as‑a‑service operation...

By SecurityWeek
Another Microsoft Defender Privilege Escalation Bug Emerges Days After Patch
NewsApr 17, 2026

Another Microsoft Defender Privilege Escalation Bug Emerges Days After Patch

Researchers have disclosed a new local privilege escalation exploit called “RedSun” that abuses Microsoft Defender’s handling of cloud‑tagged files to rewrite protected system binaries and gain SYSTEM rights. The proof‑of‑concept works on Windows 10, Windows 11 and Windows Server 2019+...

By CSO Online
Embrace Soft Forks Now to Prepare Bitcoin for Quantum Threat
SocialApr 17, 2026

Embrace Soft Forks Now to Prepare Bitcoin for Quantum Threat

The most important thing for Bitcoin community to get ready for addressing the quantum threat is taking head out of sand when it comes to soft forks and start embracing them. It'll be a big change to get post quantum, so...

By Eli Ben-Sasson
DDoS-For-Hire Services Disrupted by International Police Action in ‘Operation PowerOff’
NewsApr 17, 2026

DDoS-For-Hire Services Disrupted by International Police Action in ‘Operation PowerOff’

Operation PowerOff, a coordinated law‑enforcement effort across 21 nations, dismantled the infrastructure behind DDoS‑for‑hire services. Authorities seized 53 domains, removed over 100 URLs, and confiscated databases containing more than three million criminal user accounts. The operation led to four arrests...

By Infosecurity Magazine
Tycoon 2FA Is Down, but Not Out – Researchers Warn the Phishing as a Service Operation Is Still a Huge...
NewsApr 17, 2026

Tycoon 2FA Is Down, but Not Out – Researchers Warn the Phishing as a Service Operation Is Still a Huge...

Security researchers say Tycoon 2FA attacks remain a major threat despite a law‑enforcement takedown last month. Incidents fell 77% but still top two million per month, with the service once targeting over 500,000 organizations monthly through an adversary‑in‑the‑middle proxy that stole MFA...

By ITPro
Mythos and Cybersecurity
BlogApr 17, 2026

Mythos and Cybersecurity

Anthropic unveiled Claude Mythos Preview, an AI that autonomously discovers and exploits software vulnerabilities, but deemed too risky for public release. Access is limited to roughly 50 critical‑infrastructure firms through Project Glasswing, including Microsoft, Apple, AWS and CrowdStrike. The model...

By Schneier on Security
Critical Permissions Should Never Be Auto‑Approved by LLMs
SocialApr 17, 2026

Critical Permissions Should Never Be Auto‑Approved by LLMs

@boris_cherny Is there a way to get approve and auto accept edits back? I work on database systems my environment has very critical permissions that I just don't ever want an LLM to be able to use by itself regardless of...

By Jascha Beste
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul
NewsApr 17, 2026

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

Google announced that in 2025 it blocked or removed 8.3 billion policy‑violating ads and suspended 24.9 million accounts worldwide. At the same time it rolled out Android 17, which replaces the broad READ_CONTACTS permission with a granular Contact Picker and adds a one‑time...

By The Hacker News
As AI-Driven Fraud Grows More Sophisticated, Advanced Digital Defense Becomes Essential
NewsApr 17, 2026

As AI-Driven Fraud Grows More Sophisticated, Advanced Digital Defense Becomes Essential

TransUnion’s H1 2026 Top Fraud Trends report warns that AI‑driven scams are becoming more sophisticated, even as overall digital‑fraud rates dip. One in six U.S. consumers reported losing a median $2,307, with stolen‑card and fraudulent‑charge schemes accounting for a third of...

By AiThority » Sales Enablement
FBI and CISA Warn of Russian-Backed Phishing Campaigns Targeting Private Messaging Apps
NewsApr 17, 2026

FBI and CISA Warn of Russian-Backed Phishing Campaigns Targeting Private Messaging Apps

The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) released a joint advisory this week warning that Russian intelligence‑linked hackers are conducting large‑scale phishing campaigns against private messaging apps. The attacks aim at government officials, military personnel and journalists,...

By Pulse
LMA Survey Shows 93% of Lloyd’s Firms Adopt AI Frameworks in One Year
NewsApr 17, 2026

LMA Survey Shows 93% of Lloyd’s Firms Adopt AI Frameworks in One Year

The Lloyd’s Market Association reports that 93% of firms across the Lloyd’s market now have or are building formal AI frameworks, up from half a year ago. The shift, driven by generative AI tools, emphasizes governance, data security and human...

By Pulse
Google Agrees to $135 Million Android Data‑harvesting Settlement
NewsApr 17, 2026

Google Agrees to $135 Million Android Data‑harvesting Settlement

Google has agreed to pay $135 million to resolve a class‑action lawsuit accusing it of harvesting data from Android devices without consent. The settlement, pending final court approval on June 23, also forces Google to revise its Play Store terms and give...

By Pulse
Trader Joe’s Pays $7.4 M to Settle Class Action Over Card‑Info Printed on Receipts
NewsApr 17, 2026

Trader Joe’s Pays $7.4 M to Settle Class Action Over Card‑Info Printed on Receipts

Trader Joe’s has agreed to a $7.4 million class‑action settlement for printing the first six and last four digits of credit‑card numbers on receipts in 2019. The deal, which could pay roughly $102 per eligible shopper, underscores heightened scrutiny of payment‑data handling...

By Pulse
Paramount+ Film Leak Exposes Security Gaps, Sparks Cybersecurity Scrutiny
NewsApr 17, 2026

Paramount+ Film Leak Exposes Security Gaps, Sparks Cybersecurity Scrutiny

A hacker known as @ImStillDissin posted the entire "Legend of Aang: The Last Airbender" movie online, six months before its Paramount+ debut. The leak, traced to a compromised email chain and a 4chan distribution, has forced Paramount to launch an...

By Pulse
Palo Alto’s Helmut Reisinger Sees a Cyber Sea Change Ahead as AI Advances
NewsApr 17, 2026

Palo Alto’s Helmut Reisinger Sees a Cyber Sea Change Ahead as AI Advances

Palo Alto Networks is deepening its AI‑centric security push by joining Anthropic’s Project Glasswing, an exclusive initiative that uses Claude Mythos to uncover zero‑day vulnerabilities. The company has accelerated its platformization strategy through recent acquisitions—Protect AI, Chronosphere and the soon‑to‑close...

By CSO Online
Kuwait Banks Deploy Real-Time War Room to Fight Growing Cyber Fraud Threats
NewsApr 17, 2026

Kuwait Banks Deploy Real-Time War Room to Fight Growing Cyber Fraud Threats

Kuwait’s banking sector has launched a virtual war room that connects banks, the Central Bank, the Ministry of Interior and the Public Prosecution in real time. The platform instantly flags suspicious transactions, halts fund movement and initiates legal action, shifting...

By The Cyber Express
Orange Rag Legal Tech Clinic: “Assume You Will Be Breached” – What Law Firms Must Prioritise Now on Cyber Risk
BlogApr 17, 2026

Orange Rag Legal Tech Clinic: “Assume You Will Be Breached” – What Law Firms Must Prioritise Now on Cyber Risk

Legal tech expert Matthew Stringer urges law firms to assume they will be breached, emphasizing that phishing, ransomware and supply‑chain compromises are now routine threats. He highlights the sector's exposure due to valuable client data, time‑critical operations and sophisticated attackers....

By Legal IT Insider
GitLab 18.11 Brings Agentic AI to Security Fixes, CI Pipelines, and Delivery Analytics
NewsApr 17, 2026

GitLab 18.11 Brings Agentic AI to Security Fixes, CI Pipelines, and Delivery Analytics

GitLab unveiled version 18.11, extending its agentic AI across security remediation, CI pipeline creation, and delivery analytics. The GA Agentic SAST Vulnerability Resolution automatically generates fixes for true‑positive findings and opens merge requests with confidence scores. Two new agents—CI Expert...

By Help Net Security
New CGrabber and Direct-Sys Malware Spread Through GitHub ZIP Files
NewsApr 17, 2026

New CGrabber and Direct-Sys Malware Spread Through GitHub ZIP Files

Cyderes uncovered a sophisticated multi‑stage campaign that distributes new malware families—Direct‑Sys Loader and CGrabber Stealer—through ZIP files hosted on GitHub. The loader leverages DLL sideloading and direct syscalls to bypass antivirus and sandbox checks, while the stealer harvests passwords, crypto‑wallet...

By HackRead
That Data Breach Alert Might Be a Trap
NewsApr 17, 2026

That Data Breach Alert Might Be a Trap

Data‑breach notifications have exploded, with over 280 million alerts sent in the U.S. last year and daily European incidents rising 22 % in 2025. Cybercriminals are exploiting this flood by sending fake breach alerts that mimic real notices, often using AI‑generated content...

By WeLiveSecurity
Weaponized CVE-2026-39987 Pushes Blockchain Backdoor Through Hugging Face
NewsApr 17, 2026

Weaponized CVE-2026-39987 Pushes Blockchain Backdoor Through Hugging Face

Attackers are weaponizing CVE‑2026‑39987, a pre‑auth remote code execution flaw in the Marimo Python notebook platform, to drop a blockchain‑backed NKAbuse variant. By exploiting the vulnerability within ten hours of disclosure, they gain shell access, harvest environment variables, and pivot...

By GBHackers On Security
Microsoft: Some Windows Servers Enter Reboot Loops After April Patches
NewsApr 17, 2026

Microsoft: Some Windows Servers Enter Reboot Loops After April Patches

Microsoft confirmed that certain Windows domain controllers using Privileged Access Management enter reboot loops after installing the April 2026 security update KB5082063. The LSASS crashes cause repeated restarts, disabling authentication and potentially taking the entire domain offline. Affected operating systems include...

By BleepingComputer
U.S. CISA Adds a Flaw in Apache ActiveMQ to Its Known Exploited Vulnerabilities Catalog
BlogApr 17, 2026

U.S. CISA Adds a Flaw in Apache ActiveMQ to Its Known Exploited Vulnerabilities Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Apache ActiveMQ’s critical CVE‑2026‑34197 to its Known Exploited Vulnerabilities (KEV) catalog. The flaw, scoring 8.8 on the CVSS scale, lets an authenticated attacker exploit the Jolokia JMX‑HTTP bridge to load a...

By Security Affairs
Cursor AI Vulnerability Exposed Developer Devices
NewsApr 17, 2026

Cursor AI Vulnerability Exposed Developer Devices

Security firm Straiker uncovered a critical vulnerability, dubbed NomShub, in the Cursor AI coding assistant. The flaw combines indirect prompt injection with a sandbox‑escape that lets attackers write files and hijack the editor’s Azure‑based remote tunnel, granting persistent shell access...

By SecurityWeek
Man Gets 30 Months for Selling Thousands of Hacked DraftKings Accounts
NewsApr 17, 2026

Man Gets 30 Months for Selling Thousands of Hacked DraftKings Accounts

Kamerin Stokes, a 23‑year‑old from Memphis, was sentenced to 30 months in federal prison for operating a fraud shop that sold access to tens of thousands of hacked DraftKings accounts. The accounts were compromised in a November 2022 credential‑stuffing attack...

By BleepingComputer
Never Share Passwords in DMs—Verify Sender First
SocialApr 17, 2026

Never Share Passwords in DMs—Verify Sender First

Twitter or X is fun but just for house keeping and safety rules, never put your password into something other than to log into the platform you need to access. Any DM message that asks you to input password, even if...

By Trinh Nguyen
Unwanted Anonymous Email Sparks Creepy Concern
SocialApr 17, 2026

Unwanted Anonymous Email Sparks Creepy Concern

Few folks have reached out after having received this email, which is a new one for me. It's most certainly not me—it's weird and creepy and I'd really like it to stop. https://t.co/5ora12ynHG

By Rory Johnston
Protecting Information at Work: Actionable Strategies for All Teams
NewsApr 17, 2026

Protecting Information at Work: Actionable Strategies for All Teams

Data protection has moved beyond the IT department to become a shared responsibility across every team and workflow. Simple, low‑cost habits—such as locking screens, using strong passwords, and shredding physical documents—can dramatically lower breach risk. Clear, jargon‑free policies and a...

By eTurboNews
Prepare for Quantum Threats Now, Not on Q-Day
SocialApr 17, 2026

Prepare for Quantum Threats Now, Not on Q-Day

Post-Quantum Readiness Starts Long Before Q-Day by Etay Maor @Forbes Learn more: https://t.co/7bXzGooAsr #EmergingTech #Innovation #Technology https://t.co/fk6CZ8LQRE

By Ron van Loon
AI Overwhelms Volunteers, Echoing Past Cybersecurity Struggles
SocialApr 17, 2026

AI Overwhelms Volunteers, Echoing Past Cybersecurity Struggles

12 years ago I wrote how the internet is being protected by two guys named Steve. Today, the situation isn't all that different, except those handful of volunteers are being swamped by AI systems finding holes in our digital systems....

By Chris Stokel-Walker