Know What's Happening in Cybersecurity

Today's Cybersecurity Pulse

Anthropic CEO meets White House over federal access to Mythos AI

Anthropic CEO Dario Amodei will meet White House chief of staff Susie Wiles to discuss government access to the company's Mythos AI model, which can discover and exploit zero‑day vulnerabilities. The meeting follows a Pentagon‑imposed blacklist after Amodei refused to lift safety restrictions, while Treasury, intelligence agencies and CISA are already testing the model.

Stop Trying to Remember Your Passwords (And Use a Password Manager Instead.)
BlogApr 6, 2026

Stop Trying to Remember Your Passwords (And Use a Password Manager Instead.)

The article argues that relying on memory for passwords is insecure and advocates using a password manager to generate, store, and sync strong, unique credentials. It explains how password reuse fuels credential‑stuffing attacks and how weak, memorable passwords are easily...

By Oblivious Investor
NYS School Data Incidents Rose 72% in 2025, with 44 Reported on Long Island
NewsApr 6, 2026

NYS School Data Incidents Rose 72% in 2025, with 44 Reported on Long Island

State education officials reported a sharp rise in compromised student data across New York schools in 2025, with incidents climbing 72% from 384 in 2024 to 662 this year. The surge was highlighted in an annual report from the Department...

By DataBreaches.net
Two Data Security Incidents Affected Immigration Law Firms and Their Clients
NewsApr 6, 2026

Two Data Security Incidents Affected Immigration Law Firms and Their Clients

Immigration case‑management platform DocketWise disclosed a data breach that exposed personal information of 116,666 individuals, including Social Security numbers, passports, medical records, and payment details. The breach stemmed from compromised credentials to a third‑party partner, allowing attackers to clone repositories...

By DataBreaches.net
Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab
NewsApr 6, 2026

Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab

German authorities have unmasked the hacker known as “UNKN,” identifying him as 31‑year‑old Russian Daniil Maksimovich Shchukin. Shchukin led the notorious ransomware groups REvil and GandCrab, orchestrating at least 130 sabotage and extortion attacks in Germany between 2019 and 2021....

By DataBreaches.net
Researchers Didn’t Want to Glamorize Cybercrims. So They Roasted Them.
NewsApr 6, 2026

Researchers Didn’t Want to Glamorize Cybercrims. So They Roasted Them.

Security researchers at Trellix have launched the Dark Web Roast, a campaign that publicly mocks notorious cybercrime groups. The effort responds to calls from former CISA chief Jen Easterly and other industry leaders to stop glorifying threat actors with heroic...

By DataBreaches.net
Russia's VPN Crackdown Triggers Nationwide Bank Outage
SocialApr 6, 2026

Russia's VPN Crackdown Triggers Nationwide Bank Outage

Russia’s VPN Crackdown Caused Bank Outage, Telegram Founder Says Telegram founder Pavel Durov says filters overloaded critical systems Millions rely on VPNs as Telegram ban fails to stick Disruption briefly forced Russians to rely on cash payments nationwide

By Matt Navarra
75% of Cyberattacks Start with Phishing Emails, UAE Cyber Council Says
NewsApr 6, 2026

75% of Cyberattacks Start with Phishing Emails, UAE Cyber Council Says

The UAE Cyber Security Council warned that over 75% of cyberattacks now begin with phishing emails, citing a daily global volume of 3.4 billion deceptive messages. Attackers rely on urgent language, brand impersonation, and simple tricks to lure users into revealing...

By The Cyber Express
Google Wants to Transition to Post-Quantum Cryptography by 2029
BlogApr 6, 2026

Google Wants to Transition to Post-Quantum Cryptography by 2029

Google announced its goal to migrate all its services to post‑quantum cryptographic algorithms by 2029, aiming to replace current RSA and elliptic‑curve systems with NIST‑selected quantum‑resistant standards. The move is presented as a proactive security upgrade, though internal critics argue...

By Schneier on Security
LinkedIn Allegedly Scans Browsers for Extensions, Gathers Data
SocialApr 6, 2026

LinkedIn Allegedly Scans Browsers for Extensions, Gathers Data

LinkedIn is secretly scanning your browser for 6,000 extensions A report alleges LinkedIn uses hidden JavaScript on its website to scan visitors' browsers for installed extensions + collect device data The system collects 48 device signals, including CPU, memory, screen, language, audio...

By Matt Navarra
Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools
NewsApr 6, 2026

Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools

Cisco Talos and Trend Micro report that Qilin and Warlock ransomware groups are employing a bring‑your‑own‑vulnerable‑driver (BYOVD) strategy to neutralize endpoint detection and response (EDR) solutions. Qilin’s malware drops a malicious msimg32.dll that side‑loads two drivers—rwdrv.sys and hlpdrv.sys—to terminate more than...

By The Hacker News
Russia's VPN Blockade Cripples Banking Payments, Triggers Cash Surge
NewsApr 6, 2026

Russia's VPN Blockade Cripples Banking Payments, Triggers Cash Surge

Russia’s latest effort to curb VPN usage overloaded the state’s traffic‑filtering systems, knocking out major banking apps and leaving cash as the only payment method for hours. Telegram founder Pavel Durov said the move “just triggered a massive banking failure,”...

By Pulse
Meta Suspends $10B AI‑Training Contractor Mercur After Data Breach
NewsApr 6, 2026

Meta Suspends $10B AI‑Training Contractor Mercur After Data Breach

Meta has indefinitely paused its partnership with Mercur, the $10 billion AI‑training startup, after a supply‑chain attack leaked parts of its model‑pipeline data. The breach, linked to the open‑source LiteLLM library, forces the tech giant to reassess AI data‑supply‑chain security.

By Pulse
Fortinet Deploys Emergency Patches for Actively Exploited FortiClient EMS Zero‑Day (CVSS 9.1)
NewsApr 6, 2026

Fortinet Deploys Emergency Patches for Actively Exploited FortiClient EMS Zero‑Day (CVSS 9.1)

Fortinet rolled out out‑of‑band hotfixes for CVE‑2026‑35616, a critical 9.1‑CVSS pre‑authentication API bypass in FortiClient EMS that is already being exploited in the wild. The patches cover versions 7.4.5 and 7.4.6, with a full fix slated for the upcoming 7.4.7...

By Pulse
“Data Embassies” And Safeguarding Digital Assets During Wartime
BlogApr 6, 2026

“Data Embassies” And Safeguarding Digital Assets During Wartime

Drone strikes on Amazon Web Services facilities in the Persian Gulf and Iran’s declaration of major AI firms as legitimate targets have highlighted the vulnerability of AI‑driven data centers in conflict zones. The attacks underscore the strategic risk of housing...

By Rest of World
How Kevin Mandia Built the Most Trusted Name in Cybersecurity
PodcastApr 6, 20261h 2m

How Kevin Mandia Built the Most Trusted Name in Cybersecurity

In this episode, Kevin Mandia, founder of Mandiant and CEO of Armadillo, discusses the imminent shift to AI-driven cyber attacks and the need for autonomous defense. He explains how Armadillo is building nation‑state‑grade offensive capabilities to train and certify defenses,...

By Grit (Kleiner Perkins)
Future-Proof Your Security and Reduce Quantum Risk with Cryptographic Agility
NewsApr 6, 2026

Future-Proof Your Security and Reduce Quantum Risk with Cryptographic Agility

Enterprise encryption faces imminent quantum risk, prompting a shift to post‑quantum cryptography (PQC). Because PQC algorithms are still maturing, organizations need cryptographic agility to replace and update algorithms without service disruption. Palo Alto Networks’ PAN‑OS 12.1 demonstrates this by allowing hybrid...

By CIO Dive
Escaping the COTS Trap
NewsApr 6, 2026

Escaping the COTS Trap

Enterprise cybersecurity teams have amassed large fleets of commercial off‑the‑shelf (COTS) tools, driving complexity, cost, and risk. While COTS promises rapid deployment and lower upfront spend, dependence creates structural lock‑in that hampers future changes and migration. The article highlights how...

By CSO Online
CBP’s Flashcard Fiasco Points to a Deeper Problem: Security Culture Can’t Scale as Fast as Hiring
NewsApr 6, 2026

CBP’s Flashcard Fiasco Points to a Deeper Problem: Security Culture Can’t Scale as Fast as Hiring

U.S. Customs and Border Protection’s Kingsville station inadvertently posted a Quizlet flashcard set containing entrance codes, gate combinations, and internal system details, leaving the information publicly accessible for about six weeks. The leak was discovered in March, prompting a swift...

By SpaceDaily
Chat With Your Data: Introducing AI Assistant for Web Supply Chain Defense
NewsApr 6, 2026

Chat With Your Data: Introducing AI Assistant for Web Supply Chain Defense

Reflectiz has launched AI Assistant, a conversational AI built directly into its web supply‑chain security platform. The tool lets analysts ask natural‑language questions and receive answers drawn from live security data, eliminating the need to toggle between dashboards. It also...

By Security Boulevard
All Emerging Cyber Threats Targeting Power Infrastructure at a Glance
NewsApr 6, 2026

All Emerging Cyber Threats Targeting Power Infrastructure at a Glance

Researchers at Morocco's Higher School of Technology examined emerging cyber threats to smart grids, highlighting AI‑driven detection and defense methods. They cataloged attacks such as DDoS, false data injection, replay, and IoT‑based intrusions, emphasizing their potential to disrupt power operations....

By pv magazine
Beyond the Algorithm: Why Facial Recognition Risk Is Now a Boardroom Issue
NewsApr 6, 2026

Beyond the Algorithm: Why Facial Recognition Risk Is Now a Boardroom Issue

Facial recognition technology (FRT) is moving from a back‑office security tool to a strategic boardroom risk. Collecting biometric data exposes firms to regulatory penalties, exemplified by Clearview AI’s £7.5 million (≈$9.5 million) fine in the UK. Boards must add FRT to risk...

By Startups Magazine
Open-Source Software Malware Surging: Endor Labs
NewsApr 6, 2026

Open-Source Software Malware Surging: Endor Labs

Open-source software (OSS) malware exploded in 2025, with more than 90% of OSV malware advisories issued—a 14‑fold increase over the prior two years, and 92% of NPM account takeovers occurring that year. Although 81% of organizations rank OSS malware as...

By Crowdfund Insider
North Korean Workers Have Been Infiltrating DeFi for 7 Years: Researcher
NewsApr 6, 2026

North Korean Workers Have Been Infiltrating DeFi for 7 Years: Researcher

Cybersecurity researcher Taylor Monahan disclosed that North Korean IT specialists have been embedded in more than 40 decentralized finance projects for at least seven years. The Lazarus Group, linked to the DPRK, has stolen roughly $7 billion in crypto, including high‑profile...

By Cointelegraph
Why Voice Fraud Is CX’s Most Underestimated Problem
NewsApr 6, 2026

Why Voice Fraud Is CX’s Most Underestimated Problem

AI‑generated voice fraud is exploding, with deep‑fake scams rising 456% year‑over‑year and projected losses of $40 billion by 2027. Europe sees 13 spam calls per subscriber each month and a 15% fraud call rate in the UK, where victims lose an...

By CustomerThink
CISOs Grapple with AI Demands Within Flat Budgets
NewsApr 6, 2026

CISOs Grapple with AI Demands Within Flat Budgets

The 2026 RH‑ISAC CISO Benchmark reveals that security budgets in large organizations are inching upward, reaching 0.75 % of revenue, while overall IT spend climbs to 3.9 %. More than half of respondents expect modest 1‑10 % budget increases in 2026, but many...

By Help Net Security
Circle's Judge‑order Rule Blocks $285 M Hack Freeze
SocialApr 6, 2026

Circle's Judge‑order Rule Blocks $285 M Hack Freeze

Circle had the ability to freeze over $285M in stolen USDC from the Drift hack. They declined — their policy requires a judge’s order first. @tayvano_ explains why that’s the wrong call, and how Tether does it differently. Timestamps: 🚀 0:00 Introduction 🏦 11:21...

By Laura Shin
OpenClaw Silently Steals Emails and Calendars, Warns Researchers
SocialApr 6, 2026

OpenClaw Silently Steals Emails and Calendars, Warns Researchers

Cisco found OpenClaw skills that performed data theft without user awareness. Security researchers called it “a nightmare.” Maybe don’t give it your email and calendar. https://t.co/MFj5pVF0o6

By Michael Hyatt
AI‑Powered Counter‑Drone Systems Target Data‑Center Threats to Health Records
NewsApr 6, 2026

AI‑Powered Counter‑Drone Systems Target Data‑Center Threats to Health Records

Sentradel is marketing AI‑driven counter‑drone systems to data‑center operators after Iranian Shahed drones hit three AWS sites in March 2026. The proposal comes as global data‑center capital spending nears $1 trillion, and the cost of a single kamikaze drone ranges from...

By Pulse
Ask These Five Questions for Data Resilience
SocialApr 6, 2026

Ask These Five Questions for Data Resilience

The CISO’s Mandate: Five Critical Questions to Ask Your Storage Provider for Data Resilience https://t.co/O79CRe7P1i

By Dez Blanchfield
Securely Integrate AI Agents Into Your Workforce
SocialApr 6, 2026

Securely Integrate AI Agents Into Your Workforce

AI agents are joining the workforce, so how should organizations manage and secure them? https://t.co/4tsBSzKgf5

By TechRadar
Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab
NewsApr 6, 2026

Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab

German authorities have identified 31‑year‑old Russian Daniil Maksimovich Shchukin as the elusive “UNKN” who led the notorious ransomware groups GandCrab and REvil. Prosecutors say Shchukin and associate Anatoly Kravchuk extorted nearly €2 million (≈$2.2 million) in two dozen attacks, causing over €35 million...

By Security Boulevard
Less Reliable Than Fuzzers, Yet Occasionally Luckier
SocialApr 6, 2026

Less Reliable Than Fuzzers, Yet Occasionally Luckier

They are exactly like fuzzers except not as reliable. They can get lucky faster though sometimes.

By Teri Radichel
Leadership Gaps Fuel Cloud Security Breaches, Says Analyst Firozan
NewsApr 6, 2026

Leadership Gaps Fuel Cloud Security Breaches, Says Analyst Firozan

Faranak Firozan, a cloud‑security analyst, warned that leadership failures, not technology gaps, are the primary driver of recent high‑profile cloud breaches. In a Santa Clara briefing on April 5, 2026, she argued that unclear priorities, fragmented accountability and misaligned incentives...

By Pulse
UK Ransomware Ban Threatens FinTech Firms Amid 88% Cybercrime Surge
NewsApr 6, 2026

UK Ransomware Ban Threatens FinTech Firms Amid 88% Cybercrime Surge

Britain’s pending ransomware‑payment ban arrives as cybercrime incidents have surged 88% to 1.46 million, outpacing police staffing growth of 31%. The clash between tighter rules and limited enforcement threatens fintech firms that process payments and manage compliance.

By Pulse
Pasig Mayor Warns Public vs AI Video Using His Face
NewsApr 6, 2026

Pasig Mayor Warns Public vs AI Video Using His Face

Pasig City Mayor Vico Sotto used social media to alert residents that an AI‑generated video featuring his likeness is promoting an illegal gambling website. He warned that deepfake videos are increasingly realistic, making it harder for victims to distinguish authentic...

By The Manila Times – Business
From RAG to Zero‑Trust: Verifying Hostile LLM Memory
SocialApr 6, 2026

From RAG to Zero‑Trust: Verifying Hostile LLM Memory

“i came in thinking I’d build a RAG system. i left with a zero-trust verification pipeline that treats the LLM’s parametric memory as hostile.” 👀 🔗 https://t.co/nFZBhpfUKq https://t.co/HYoRr2wYhf

By Andrew Arruda
LinkedIn Scams: An Ecosystem of Identity Theft and Fraud
SocialApr 5, 2026

LinkedIn Scams: An Ecosystem of Identity Theft and Fraud

LinkedIn scams go beyond fake posts or “I’m grateful” stories; they form an ecosystem of identity abuse, data harvesting, and financial fraud.

By Raquel (Deep Search)
Using A VPN Could Subject You To Government Surveillance, Senators Warn [Roundup]
BlogApr 5, 2026

Using A VPN Could Subject You To Government Surveillance, Senators Warn [Roundup]

U.S. senators have cautioned that using commercial VPNs, many of which are foreign‑owned, could inadvertently waive privacy protections and expose Americans to government surveillance. The Department of Homeland Security notes billions are spent each year on such services, highlighting potential...

By View from the Wing
Meta Halts AI Training After Data Breach Exposes Secrets
SocialApr 5, 2026

Meta Halts AI Training After Data Breach Exposes Secrets

Meta freezes AI data work after breach puts training secrets at risk https://t.co/WtjqyiuUAu via @thenextweb

By Paul Triolo
User Seeks Help Recovering Hijacked X Account
SocialApr 5, 2026

User Seeks Help Recovering Hijacked X Account

Hey @nikitabier my friend JT’s X account got taken over. It was @tcmllc I can send over any details via DM Can you help us out?

By Richard Moglen
Funniest/Most Insightful Comments Of The Week At Techdirt
NewsApr 5, 2026

Funniest/Most Insightful Comments Of The Week At Techdirt

Techdirt’s weekly roundup highlighted the most insightful and funniest reader comments, ranging from a security analysis of the White House’s new app to sharp legal critiques of the Murthy ruling. The editorial spotlight featured a deep dive into Virginia’s controversial...

By Techdirt
Senators Warn VPN Use May Invite Government Surveillance
SocialApr 5, 2026

Senators Warn VPN Use May Invite Government Surveillance

Using A VPN Could Subject You To Government Surveillance, Senators Warn [Roundup] - View from the Wing https://t.co/hJwQPvAsyq

By Gary Leff
Iran’s Charming Kitten Exploits Insiders and Low‑tech Tricks
SocialApr 5, 2026

Iran’s Charming Kitten Exploits Insiders and Low‑tech Tricks

Iran’s Charming Kitten group relies on deception, insider access, and low-tech methods to steal trade secrets and compromise systems. https://t.co/8jKdiH2bzt

By TechRadar
Alcatraz Raises $50 Million Series B for AI‑Powered Facial Authentication in Commercial Buildings
NewsApr 5, 2026

Alcatraz Raises $50 Million Series B for AI‑Powered Facial Authentication in Commercial Buildings

Alcatraz, the Cupertino‑based AI security startup, announced a $50 million Series B led by BlackPeak Capital, Cogito Capital and Taiwania Capital. The funding will accelerate its Rock™ facial authentication system, which replaces badges and PINs with privacy‑first AI, across data centers,...

By Pulse
Valid Finding Reveals Overlooked Cookie Injection Requirement
SocialApr 5, 2026

Valid Finding Reveals Overlooked Cookie Injection Requirement

The finding is valid but we need to have a cookie injection on the target or its subdomains but I noticed something the AI didn’t notice…yes AI with humans or spend a lot a lot of tokens.

By Teri Radichel
UK Tightens Energy Cybersecurity After Poland Attack
SocialApr 5, 2026

UK Tightens Energy Cybersecurity After Poland Attack

UK defining stronger energy cybersecurity rules after Poland attack #energysky -- via pv magazine global: https://t.co/UAgNu4x2di

By Tor “SolarFred” Valenza
Anthropic’s Claude Code Leak: Why the Instinct to Fire Someone Is the Lazy Response
BlogApr 5, 2026

Anthropic’s Claude Code Leak: Why the Instinct to Fire Someone Is the Lazy Response

Anthropic unintentionally released nearly 2,000 Claude Code source files, which were quickly copied and viewed 29 million times online. The company framed the incident as a human‑error packaging issue and confirmed no employee was dismissed. CEO Boris Cherny emphasized that the...

By Lean Blog
Hope Hyperliquid Is Conducting Emergency Security Review
SocialApr 5, 2026

Hope Hyperliquid Is Conducting Emergency Security Review

I really hope Hyperliquid is in a war room right now assuming they’ve already been compromised and reviewing every last thing they’ve done for the last year and a half …

By Laura Shin
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 91
BlogApr 5, 2026

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 91

The Security Affairs Malware Newsletter Round 91 aggregates the latest high‑impact malware research, spotlighting a new macOS infostealer called Infiniti that leverages ClickFix and Python/Nuitka, and a WebSocket‑based pivoting implant named RoadK1ll. It also details a series of supply‑chain compromises of...

By Security Affairs