Know What's Happening in Cybersecurity

Today's Cybersecurity Pulse

Anthropic CEO meets White House over federal access to Mythos AI

Anthropic CEO Dario Amodei will meet White House chief of staff Susie Wiles to discuss government access to the company's Mythos AI model, which can discover and exploit zero‑day vulnerabilities. The meeting follows a Pentagon‑imposed blacklist after Amodei refused to lift safety restrictions, while Treasury, intelligence agencies and CISA are already testing the model.

Exclusive-Russia Supplies Iran with Cyber Support, Spy Imagery to Hone Attacks, Ukraine Says
NewsApr 7, 2026

Exclusive-Russia Supplies Iran with Cyber Support, Spy Imagery to Hone Attacks, Ukraine Says

Russian reconnaissance satellites conducted at least 24 passes over 46 military and critical sites in 11 Middle Eastern countries during March 21‑31, sharing high‑resolution imagery with Iran. The data preceded Iranian missile and drone attacks on bases, including a strike on...

By Al-Monitor
FortiClientEMS Vulnerabilities Under Active Exploitation, Expose Systems to RCE
NewsApr 7, 2026

FortiClientEMS Vulnerabilities Under Active Exploitation, Expose Systems to RCE

Fortinet disclosed two critical vulnerabilities in its FortiClientEMS endpoint management platform that are already being exploited in the wild. CVE-2026-21643 is a SQL injection flaw in the admin interface of version 7.4.4, allowing unauthenticated remote code execution. CVE-2026-35616 is an...

By The Cyber Express
Trump Administration Releases Cyber Strategy
NewsApr 7, 2026

Trump Administration Releases Cyber Strategy

The Trump administration unveiled a new Cyber Strategy for America in March 2026, paired with Executive Order 14390 to intensify federal action against cybercrime. The strategy outlines six pillars—deterrence, streamlined regulation, federal network modernization, critical‑infrastructure protection, technology superiority, and talent...

By EDUCAUSE Review
$20 Billion Lost to Cybercrime as AI and Investment Scams Surge: FBI Report
NewsApr 7, 2026

$20 Billion Lost to Cybercrime as AI and Investment Scams Surge: FBI Report

The FBI’s 2025 Internet Crime Report records a historic $20.8 billion in losses from more than one million complaints. Cyber‑enabled fraud accounted for roughly $17.7 billion, with investment scams—especially cryptocurrency schemes—driving $8.6 billion of that damage. AI‑powered scams emerged as a new threat,...

By The Cyber Express
The Case for Fixing CWE Weakness Patterns Instead of Patching One Bug at a Time
NewsApr 7, 2026

The Case for Fixing CWE Weakness Patterns Instead of Patching One Bug at a Time

CWE is transitioning from a background taxonomy to a core element of vulnerability disclosure, with a growing share of CVE records now including CNA‑provided CWE IDs. Precise, lower‑level CWE mappings are improving root‑cause visibility, enabling teams to target systemic weakness...

By Help Net Security
Jones Day Law Firm Says Hackers Accessed Some Clients’ Data
NewsApr 7, 2026

Jones Day Law Firm Says Hackers Accessed Some Clients’ Data

Jones Day disclosed that the cyber‑criminal group Silent breached its network, accessing dated files for ten clients. The intrusion stemmed from a phishing attack, and the firm confirmed that all impacted clients have been notified. Hackers also exfiltrated internal data...

By Insurance Journal
MyRepublic Launches Email Guard for Singapore SME Protection
NewsApr 7, 2026

MyRepublic Launches Email Guard for Singapore SME Protection

MyRepublic has launched Email Guard, a managed email security service tailored for Singapore’s small and medium‑sized enterprises. The solution, built on Check Point’s threat‑prevention technology, safeguards against phishing, malware, and business‑email compromise across Microsoft 365 and Google Workspace. It offers...

By Vietnam Investment Review (VIR)
Windows 11 Is Phasing Out Old Kernel Drivers: Microsoft Will Permanently End Cross-Signing in April
BlogApr 7, 2026

Windows 11 Is Phasing Out Old Kernel Drivers: Microsoft Will Permanently End Cross-Signing in April

Microsoft announced that, starting with the April 2026 security update, Windows 11 will permanently stop trusting kernel drivers signed under the old Cross‑Signed Program. The change applies to Windows 11 24H2, 25H2, 26H1 and Windows Server 2025, allowing only drivers vetted through the Windows...

By Igor’sLAB
Don’t Wait for 2027 – Make Your Smart Product Security Visible Now
NewsApr 7, 2026

Don’t Wait for 2027 – Make Your Smart Product Security Visible Now

Australia is introducing a national security label for smart devices, slated for a 2027 launch, with an industry pilot beginning in October 2026. The label will provide a clear, comparable security credential at the point of sale, shifting security from...

By iTnews (Australia) – Government
Cambodian Parliament Passes Landmark Cybercrime Law
NewsApr 7, 2026

Cambodian Parliament Passes Landmark Cybercrime Law

Cambodia's parliament approved its first cybercrime law targeting scam centres that have defrauded international victims of billions. The legislation prescribes prison terms of two to ten years and fines up to $250,000 for large‑scale operations. It also criminalises money‑laundering, data...

By iTnews (Australia) – Government
AI-Assisted Fraud Makes Big Debut in FBI's Cybercrime Stats
NewsApr 7, 2026

AI-Assisted Fraud Makes Big Debut in FBI's Cybercrime Stats

The FBI’s 2025 Internet Crime Complaint Centre report introduced AI‑assisted fraud as a distinct category, documenting $893 million in losses. Overall cybercrime losses topped $20 billion, a 26 percent rise from 2024, with investment scams leading at $8.6 billion. AI‑generated content fueled business‑email‑compromise, voice‑cloning,...

By iTnews (Australia) – Government
Jones Day Confirms Limited Breach After Phishing Attack by Silent Ransom Group
NewsApr 7, 2026

Jones Day Confirms Limited Breach After Phishing Attack by Silent Ransom Group

Jones Day, one of the nation’s top law firms, confirmed a limited data breach after the Silent Ransom Group (SRG) posted files for ten clients on a dark‑web leak site. The attackers demanded roughly $13 million to delete the stolen data...

By DataBreaches.net
Turn Fear Into Action: Strengthen Security with AI
SocialApr 7, 2026

Turn Fear Into Action: Strengthen Security with AI

I was afraid this afternoon. Read a security report that a massive cyberattack is coming. Fear causes the human mind to do weird things. My mom, in 1988, thought a massive nuclear war was coming, so joined a Montana suvivalist cult. Had...

By Robert Scoble
Flowise AI Agent Builder Faces Active CVSS 10 RCE Attack
SocialApr 7, 2026

Flowise AI Agent Builder Faces Active CVSS 10 RCE Attack

Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed https://t.co/aINT8EHBFi https://t.co/SKA564pKd5

By Eric Vanderburg
Malwarebytes Passes First Independent No-Logs VPN Audit, Boosting SaaS Trust
NewsApr 7, 2026

Malwarebytes Passes First Independent No-Logs VPN Audit, Boosting SaaS Trust

Malwarebytes announced that its Privacy VPN has cleared a rigorous, independent audit by security firm X41 D‑Sec, which found no evidence of user‑activity logging. The two‑month white‑box assessment also uncovered and helped fix a critical vulnerability, underscoring the company's commitment...

By Pulse
Unpatched Claude Coding Flaw Lets Attackers Steal Cowork Files
SocialApr 7, 2026

Unpatched Claude Coding Flaw Lets Attackers Steal Cowork Files

Attackers can exfiltrate user files from Cowork by exploiting an unremediated vulnerability in Claude’s coding environment, which now extends to Cowork. The vulnerability was first identified in https://t.co/noHjpUqN1I chat before Cowork existed by Johann Rehberger, who disclosed the vulnerability. It...

By Garry Tan
Iran's Cyber Arsenal Now Targets Critical Infrastructure Worldwide
SocialApr 7, 2026

Iran's Cyber Arsenal Now Targets Critical Infrastructure Worldwide

Iran has rapidly developed advanced cyber capabilities, evolving from information gathering to conducting destructive, state-linked attacks against critical infrastructure in the U.S., Israel, and the Gulf states. https://t.co/XlKdD8VuZu

By Teri Radichel
Claude Code Leak: Researchers Find First Vulnerability
BlogApr 7, 2026

Claude Code Leak: Researchers Find First Vulnerability

Anthropic unintentionally published a source map that revealed roughly 512,000 lines of Claude Code's TypeScript source. Researchers used the leak to uncover a critical flaw allowing command‑chain bypass of the tool's deny‑rule system after 50 subcommands. The vulnerability could let...

By Notebookcheck
New Threat Evolves Script Kiddies, Targets Everyday Users
SocialApr 7, 2026

New Threat Evolves Script Kiddies, Targets Everyday Users

read this when it first came out.. my first thought was crystal clear: "This is simply the natural evolution of SCRIPT KIDDIES but on steroids.." my second thought was broader: "The majority of every day people, will indeed at some point very soon, fall...

By Dez Blanchfield
New Cyber Threats Target Power Grid Infrastructure
SocialApr 7, 2026

New Cyber Threats Target Power Grid Infrastructure

All emerging cyber threats targeting power infrastructure at a glance #energysky -- via pv magazine usa: https://t.co/CgfOPDFHMV

By Tor “SolarFred” Valenza
China Ready to Interfere in Local Elections: NSB
NewsApr 7, 2026

China Ready to Interfere in Local Elections: NSB

Taiwan’s National Security Bureau warned that Beijing is poised to interfere in the November nine‑in‑one local elections through a coordinated hybrid campaign. The report details more than 173 million cyber attacks on the government service network, 13,000 suspicious online accounts and...

By Taipei Times – Business
Pipeline Security Lessons From March Supply Chain Incidents
NewsApr 7, 2026

Pipeline Security Lessons From March Supply Chain Incidents

Between March 19 and March 31, 2026, the TeamPCP threat group executed four supply‑chain attacks that compromised the open‑source scanner Trivy, the IaC scanner Checkmarx KICS, the AI model gateway LiteLLM, and the JavaScript client axios. Each breach leveraged malicious...

By GitLab Blog
ATO Adds In-App Call Verification to Stop Scams
NewsApr 6, 2026

ATO Adds In-App Call Verification to Stop Scams

The Australian Taxation Office (ATO) has introduced a new in‑app “verify call” feature that lets taxpayers confirm whether a phone call claiming to be from the ATO is authentic within 30 seconds. The tool, available on iOS and Android, pushes...

By iTnews (Australia) – Government
2027 POTUS Budget Proposal Targets CISA With Funding Cuts
NewsApr 6, 2026

2027 POTUS Budget Proposal Targets CISA With Funding Cuts

The FY2027 White House budget proposes cutting the Cybersecurity and Infrastructure Security Agency’s (CISA) funding by up to $707 million, reducing its budget to just over $2 billion. The administration frames the reductions as a strategic realignment that narrows CISA’s focus to...

By eSecurity Planet
AI-Assisted Supply Chain Attack Targets GitHub
NewsApr 6, 2026

AI-Assisted Supply Chain Attack Targets GitHub

A threat actor used AI‑assisted automation to launch the "prt‑scan" supply‑chain campaign on GitHub, opening over 500 malicious pull requests between March 11 and early April. The campaign targeted repositories that use the vulnerable pull_request_target workflow, compromising fewer than 10 %...

By Dark Reading
Autonomous Agents Pose a New Large‑scale Threat
SocialApr 6, 2026

Autonomous Agents Pose a New Large‑scale Threat

An agent with a goal and agency can do real damage. We used to worry about compromised accounts. Now we need to worry about autonomous decision-making at scale. That is a very different risk model.

By Sean D. Mack
Scammers Posing as Federal Officials Drive Complaints up and Rack up $800 Million in Losses
NewsApr 6, 2026

Scammers Posing as Federal Officials Drive Complaints up and Rack up $800 Million in Losses

The FBI’s 2025 Internet Crime Complaint Center report shows government‑impersonation scams nearly doubled from 2024, with complaints rising from about 17,300 to 32,500. Victims lost roughly $797 million in 2025, up from $405 million the year before, placing this fraud among the...

By GovExec
Axios Attack Shows Complex Social Engineering Is Industrialized
NewsApr 6, 2026

Axios Attack Shows Complex Social Engineering Is Industrialized

The popular JavaScript HTTP client Axios was compromised when North Korean state‑linked group UNC1069 socially engineered lead maintainer Jason Saayman into installing a malicious dependency. The attackers delivered a remote‑access Trojan via a fake Slack workspace and Microsoft Teams call,...

By Dark Reading
Maine House Advances McCabe Bill to Strengthen Cybersecurity at Maine Hospitals
NewsApr 6, 2026

Maine House Advances McCabe Bill to Strengthen Cybersecurity at Maine Hospitals

The Maine House unanimously advanced Rep. Julie McCabe’s LD 2103, mandating hospitals adopt cybersecurity plans aligned with DHS and CISA best practices. The bill requires prompt law‑enforcement notification, backup communication systems, and annual staff training. It responds to spring cyber‑attacks that...

By DataBreaches.net
Microsoft Links Medusa Ransomware Affiliate to Zero-Day Attacks
NewsApr 6, 2026

Microsoft Links Medusa Ransomware Affiliate to Zero-Day Attacks

Microsoft has identified Storm-1175, a China‑based financially motivated cybercrime group, as an affiliate of the Medusa ransomware operation. The gang is now leveraging both known (n‑day) and previously undisclosed (zero‑day) vulnerabilities in rapid, high‑velocity attacks. Microsoft’s intelligence shows Storm-1175 can...

By DataBreaches.net
Fortinet Issues Emergency Patch for FortiClient Zero-Day
NewsApr 6, 2026

Fortinet Issues Emergency Patch for FortiClient Zero-Day

Fortinet issued an emergency hotfix for the critical CVE‑2026‑35616 zero‑day in its FortiClient Endpoint Management Server, a 9.1‑CVSS flaw that enables unauthenticated code execution. The vulnerability has already been exploited in the wild, prompting a security advisory that recommends immediate...

By Dark Reading
Radim Marek: Don't Let Your AI Touch Production
NewsApr 6, 2026

Radim Marek: Don't Let Your AI Touch Production

AI coding agents now generate SQL that looks correct but often ignores execution plans, locking behavior, and data distribution, leading to costly production incidents. Radim Marek argues that the missing piece is real‑time awareness of the production schema, including table...

By Planet PostgreSQL
Anthropic's Claude Code Leak: Should RIA Firms and Advisors Be Worried?
NewsApr 6, 2026

Anthropic's Claude Code Leak: Should RIA Firms and Advisors Be Worried?

Anthropic accidentally exposed the raw instruction set behind its Claude Code model on GitHub, prompting a rapid takedown effort. No personally identifiable information was leaked, but the incident reveals gaps in the company’s internal security controls. Wealth‑tech advisors are urged to...

By InvestmentNews – ETFs
LinkedIn Faces Scrutiny Over 'BrowserGate' Script Scanning 6,236 Extensions
NewsApr 6, 2026

LinkedIn Faces Scrutiny Over 'BrowserGate' Script Scanning 6,236 Extensions

A report by Fairlinked e.V. alleges LinkedIn injects a hidden JavaScript that checks for 6,236 Chrome extensions and harvests detailed device telemetry. LinkedIn says the script is meant to block scraping tools, but regulators and users are questioning the privacy...

By Pulse
5 Email Myths That Are Quietly Damaging Your Brand’s Reputation
NewsApr 6, 2026

5 Email Myths That Are Quietly Damaging Your Brand’s Reputation

Retailers are enjoying AI‑driven personalization, yet 27% remain in a DMARC enforcement gap, exposing them to domain spoofing. Valimail’s 2026 State of DMARC report shows many have only reporting‑only records, which lets attackers use their brand in AI‑generated phishing emails....

By Total Retail
CNET Study Shows 54% of US Laptop Users Face Malware, 88% Take Action
NewsApr 6, 2026

CNET Study Shows 54% of US Laptop Users Face Malware, 88% Take Action

CNET’s latest survey reveals that 54% of U.S. adults with personal laptops have encountered potential malware in the last year, while 88% reported taking action. The findings highlight a gap between built‑in antivirus tools and user vigilance, prompting calls for...

By Pulse
Hims & Hers Says Limited Data Stolen in Social Engineering Attack
NewsApr 6, 2026

Hims & Hers Says Limited Data Stolen in Social Engineering Attack

Hims & Hers disclosed a sophisticated social‑engineering breach that compromised its third‑party customer‑service platform from February 4‑7, 2026. Hackers accessed service tickets, exposing customer names and email addresses, but the firm confirmed that electronic medical records and provider communications were untouched....

By BioPharma Dive
New Cyber Strategy Shifts Attention to Cloud and Supply Chain Security
NewsApr 6, 2026

New Cyber Strategy Shifts Attention to Cloud and Supply Chain Security

The White House released a new National Cybersecurity Strategy on March 6, 2026, shifting federal priorities toward cloud data protection and software supply‑chain security. While zero‑trust, AI security, and post‑quantum cryptography remain core, the strategy mandates faster cloud migration and...

By Washington Technology
Disgruntled Researcher Leaks “BlueHammer” Windows Zero-Day Exploit
NewsApr 6, 2026

Disgruntled Researcher Leaks “BlueHammer” Windows Zero-Day Exploit

A security researcher known as Chaotic Eclipse publicly released exploit code for a previously private Windows privilege‑escalation vulnerability dubbed BlueHammer. The flaw, a local privilege escalation combining a TOCTOU and path‑confusion bug, allows a local attacker to obtain SYSTEM or...

By BleepingComputer
New Mexico’s Meta Ruling and Encryption
BlogApr 6, 2026

New Mexico’s Meta Ruling and Encryption

A New Mexico judge ruled that Meta’s 2023 addition of end‑to‑end encryption to Facebook Messenger created liability because predators could use the shielded platform to groom minors. The state is seeking court‑mandated changes that could force Meta to weaken or...

By Schneier on Security
How to Combat Cyber-Enabled Cargo Theft: Insights From NMFTA
BlogApr 6, 2026

How to Combat Cyber-Enabled Cargo Theft: Insights From NMFTA

At its Spring Meeting in Savannah, the NMFTA highlighted the growing threat of cyber‑enabled cargo theft. A panel with Werner Enterprises, Johanson Transportation Service and NMFTA’s cybersecurity director stressed that any cargo theft should trigger immediate involvement of a company’s...

By Commercial Carrier Journal (CCJ)
Cybercriminals Accelerate: Storm-1175 Beats Patches in Days
SocialApr 6, 2026

Cybercriminals Accelerate: Storm-1175 Beats Patches in Days

It is not every day that a financially motivated threat actor manages to move faster than the vendors trying to secure their products. Yet that is precisely what Microsoft says Storm-1175 has been doing. The China-based cybercriminal group, closely associated...

By Rich Tehrani
Y Combinator Leader Overlooks OpenClaw Security Vulnerabilities
SocialApr 6, 2026

Y Combinator Leader Overlooks OpenClaw Security Vulnerabilities

Wild: the head of Y Combinator seems pretty blind to the security risks in OpenClaw.

By Gary Marcus
Sherlock Bug Bounty for Aave V4 Now Live
SocialApr 6, 2026

Sherlock Bug Bounty for Aave V4 Now Live

Sherlock bug bounty for Aave V4 is live. Learn more below about the program and scope.

By Stani Kulechov
Negligence Fuels Social Engineering Attacks, Accountability Needed
SocialApr 6, 2026

Negligence Fuels Social Engineering Attacks, Accountability Needed

"It's mainly social engineering attacks. ... If you're grossly negligent, you should definitely be held accountable." https://t.co/8bYXWatFF8

By Laura Shin
Questioning TestFlight Use After Drift Hack Tactics
SocialApr 6, 2026

Questioning TestFlight Use After Drift Hack Tactics

"Do you stay away from TestFlight right now?" -- @perkinscr97 on the tactics used in the Drift hack https://t.co/8bYXWatFF8

By Laura Shin
Nation‑state Attacks on Startups Guarantee Their Own Victory
SocialApr 6, 2026

Nation‑state Attacks on Startups Guarantee Their Own Victory

"When a nation-state attacks a startup, the nation-state is going to win every single time." -- @perkinscr97 https://t.co/jfZlSDnB86

By Laura Shin
Seal911 Success Highlights Need for Stronger Endpoint Security
SocialApr 6, 2026

Seal911 Success Highlights Need for Stronger Endpoint Security

"The fact that that Seal911 has been the saving grace for a bunch of teams shows that people could put more resources into better endpoint security." -- @llewellenmichael https://t.co/8bYXWatFF8

By Laura Shin
Enterprise Domain Management Requires Strict Renewal and Security Processes
SocialApr 6, 2026

Enterprise Domain Management Requires Strict Renewal and Security Processes

Hive mind - how do large enterprises manage their domains? I'd love to talk to some IT leaders - what processes ensure https://t.co/VFOQyhfres or https://t.co/kuiRO5DwUb or https://t.co/N7kgQgrxQy doesn't expire, or get socially engineered into a redirect or transfer?

By Bill D'Alessandro