Today's Cybersecurity Pulse
Anthropic CEO meets White House over federal access to Mythos AI
Anthropic CEO Dario Amodei will meet White House chief of staff Susie Wiles to discuss government access to the company's Mythos AI model, which can discover and exploit zero‑day vulnerabilities. The meeting follows a Pentagon‑imposed blacklist after Amodei refused to lift safety restrictions, while Treasury, intelligence agencies and CISA are already testing the model.
Also developing:
By the numbers: Artemis raises $70M in combined seed and Series A round
GlobalLogic Completes Cybersecurity Audit of Ahmedabad Municipal Transport Corporation’s EV Bus Fleet
GlobalLogic, a Hitachi Group company, completed a cybersecurity audit of the Ahmedabad Municipal Transport Corporation’s electric‑bus fleet deployed on February 13, 2026. The audit, conducted with IRCLASS Systems, examined in‑vehicle networks, firmware, CCTV, passenger‑information displays, emergency mechanisms, and the supporting digital platforms using penetration‑testing methods aligned with international automotive cybersecurity standards. Findings will guide remediation before a citywide rollout, reinforcing the safety of connected public‑transport assets. The initiative highlights the rising priority of digital safety alongside mechanical reliability in modern transit systems.
Stop Trying to Remember Your Passwords (And Use a Password Manager Instead.)
The article argues that relying on memory for passwords is insecure and advocates using a password manager to generate, store, and sync strong, unique credentials. It explains how password reuse fuels credential‑stuffing attacks and how weak, memorable passwords are easily...
NYS School Data Incidents Rose 72% in 2025, with 44 Reported on Long Island
State education officials reported a sharp rise in compromised student data across New York schools in 2025, with incidents climbing 72% from 384 in 2024 to 662 this year. The surge was highlighted in an annual report from the Department...
Two Data Security Incidents Affected Immigration Law Firms and Their Clients
Immigration case‑management platform DocketWise disclosed a data breach that exposed personal information of 116,666 individuals, including Social Security numbers, passports, medical records, and payment details. The breach stemmed from compromised credentials to a third‑party partner, allowing attackers to clone repositories...
Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab
German authorities have unmasked the hacker known as “UNKN,” identifying him as 31‑year‑old Russian Daniil Maksimovich Shchukin. Shchukin led the notorious ransomware groups REvil and GandCrab, orchestrating at least 130 sabotage and extortion attacks in Germany between 2019 and 2021....
Researchers Didn’t Want to Glamorize Cybercrims. So They Roasted Them.
Security researchers at Trellix have launched the Dark Web Roast, a campaign that publicly mocks notorious cybercrime groups. The effort responds to calls from former CISA chief Jen Easterly and other industry leaders to stop glorifying threat actors with heroic...
Russia's VPN Crackdown Triggers Nationwide Bank Outage
Russia’s VPN Crackdown Caused Bank Outage, Telegram Founder Says Telegram founder Pavel Durov says filters overloaded critical systems Millions rely on VPNs as Telegram ban fails to stick Disruption briefly forced Russians to rely on cash payments nationwide

75% of Cyberattacks Start with Phishing Emails, UAE Cyber Council Says
The UAE Cyber Security Council warned that over 75% of cyberattacks now begin with phishing emails, citing a daily global volume of 3.4 billion deceptive messages. Attackers rely on urgent language, brand impersonation, and simple tricks to lure users into revealing...
Google Wants to Transition to Post-Quantum Cryptography by 2029
Google announced its goal to migrate all its services to post‑quantum cryptographic algorithms by 2029, aiming to replace current RSA and elliptic‑curve systems with NIST‑selected quantum‑resistant standards. The move is presented as a proactive security upgrade, though internal critics argue...
LinkedIn Allegedly Scans Browsers for Extensions, Gathers Data
LinkedIn is secretly scanning your browser for 6,000 extensions A report alleges LinkedIn uses hidden JavaScript on its website to scan visitors' browsers for installed extensions + collect device data The system collects 48 device signals, including CPU, memory, screen, language, audio...

Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools
Cisco Talos and Trend Micro report that Qilin and Warlock ransomware groups are employing a bring‑your‑own‑vulnerable‑driver (BYOVD) strategy to neutralize endpoint detection and response (EDR) solutions. Qilin’s malware drops a malicious msimg32.dll that side‑loads two drivers—rwdrv.sys and hlpdrv.sys—to terminate more than...
Russia's VPN Blockade Cripples Banking Payments, Triggers Cash Surge
Russia’s latest effort to curb VPN usage overloaded the state’s traffic‑filtering systems, knocking out major banking apps and leaving cash as the only payment method for hours. Telegram founder Pavel Durov said the move “just triggered a massive banking failure,”...
Meta Suspends $10B AI‑Training Contractor Mercur After Data Breach
Meta has indefinitely paused its partnership with Mercur, the $10 billion AI‑training startup, after a supply‑chain attack leaked parts of its model‑pipeline data. The breach, linked to the open‑source LiteLLM library, forces the tech giant to reassess AI data‑supply‑chain security.
Fortinet Deploys Emergency Patches for Actively Exploited FortiClient EMS Zero‑Day (CVSS 9.1)
Fortinet rolled out out‑of‑band hotfixes for CVE‑2026‑35616, a critical 9.1‑CVSS pre‑authentication API bypass in FortiClient EMS that is already being exploited in the wild. The patches cover versions 7.4.5 and 7.4.6, with a full fix slated for the upcoming 7.4.7...

“Data Embassies” And Safeguarding Digital Assets During Wartime
Drone strikes on Amazon Web Services facilities in the Persian Gulf and Iran’s declaration of major AI firms as legitimate targets have highlighted the vulnerability of AI‑driven data centers in conflict zones. The attacks underscore the strategic risk of housing...

How Kevin Mandia Built the Most Trusted Name in Cybersecurity
In this episode, Kevin Mandia, founder of Mandiant and CEO of Armadillo, discusses the imminent shift to AI-driven cyber attacks and the need for autonomous defense. He explains how Armadillo is building nation‑state‑grade offensive capabilities to train and certify defenses,...
Future-Proof Your Security and Reduce Quantum Risk with Cryptographic Agility
Enterprise encryption faces imminent quantum risk, prompting a shift to post‑quantum cryptography (PQC). Because PQC algorithms are still maturing, organizations need cryptographic agility to replace and update algorithms without service disruption. Palo Alto Networks’ PAN‑OS 12.1 demonstrates this by allowing hybrid...
Escaping the COTS Trap
Enterprise cybersecurity teams have amassed large fleets of commercial off‑the‑shelf (COTS) tools, driving complexity, cost, and risk. While COTS promises rapid deployment and lower upfront spend, dependence creates structural lock‑in that hampers future changes and migration. The article highlights how...

CBP’s Flashcard Fiasco Points to a Deeper Problem: Security Culture Can’t Scale as Fast as Hiring
U.S. Customs and Border Protection’s Kingsville station inadvertently posted a Quizlet flashcard set containing entrance codes, gate combinations, and internal system details, leaving the information publicly accessible for about six weeks. The leak was discovered in March, prompting a swift...
Chat With Your Data: Introducing AI Assistant for Web Supply Chain Defense
Reflectiz has launched AI Assistant, a conversational AI built directly into its web supply‑chain security platform. The tool lets analysts ask natural‑language questions and receive answers drawn from live security data, eliminating the need to toggle between dashboards. It also...
All Emerging Cyber Threats Targeting Power Infrastructure at a Glance
Researchers at Morocco's Higher School of Technology examined emerging cyber threats to smart grids, highlighting AI‑driven detection and defense methods. They cataloged attacks such as DDoS, false data injection, replay, and IoT‑based intrusions, emphasizing their potential to disrupt power operations....
Beyond the Algorithm: Why Facial Recognition Risk Is Now a Boardroom Issue
Facial recognition technology (FRT) is moving from a back‑office security tool to a strategic boardroom risk. Collecting biometric data exposes firms to regulatory penalties, exemplified by Clearview AI’s £7.5 million (≈$9.5 million) fine in the UK. Boards must add FRT to risk...

Open-Source Software Malware Surging: Endor Labs
Open-source software (OSS) malware exploded in 2025, with more than 90% of OSV malware advisories issued—a 14‑fold increase over the prior two years, and 92% of NPM account takeovers occurring that year. Although 81% of organizations rank OSS malware as...

North Korean Workers Have Been Infiltrating DeFi for 7 Years: Researcher
Cybersecurity researcher Taylor Monahan disclosed that North Korean IT specialists have been embedded in more than 40 decentralized finance projects for at least seven years. The Lazarus Group, linked to the DPRK, has stolen roughly $7 billion in crypto, including high‑profile...
Why Voice Fraud Is CX’s Most Underestimated Problem
AI‑generated voice fraud is exploding, with deep‑fake scams rising 456% year‑over‑year and projected losses of $40 billion by 2027. Europe sees 13 spam calls per subscriber each month and a 15% fraud call rate in the UK, where victims lose an...

CISOs Grapple with AI Demands Within Flat Budgets
The 2026 RH‑ISAC CISO Benchmark reveals that security budgets in large organizations are inching upward, reaching 0.75 % of revenue, while overall IT spend climbs to 3.9 %. More than half of respondents expect modest 1‑10 % budget increases in 2026, but many...
Circle's Judge‑order Rule Blocks $285 M Hack Freeze
Circle had the ability to freeze over $285M in stolen USDC from the Drift hack. They declined — their policy requires a judge’s order first. @tayvano_ explains why that’s the wrong call, and how Tether does it differently. Timestamps: 🚀 0:00 Introduction 🏦 11:21...
OpenClaw Silently Steals Emails and Calendars, Warns Researchers
Cisco found OpenClaw skills that performed data theft without user awareness. Security researchers called it “a nightmare.” Maybe don’t give it your email and calendar. https://t.co/MFj5pVF0o6
AI‑Powered Counter‑Drone Systems Target Data‑Center Threats to Health Records
Sentradel is marketing AI‑driven counter‑drone systems to data‑center operators after Iranian Shahed drones hit three AWS sites in March 2026. The proposal comes as global data‑center capital spending nears $1 trillion, and the cost of a single kamikaze drone ranges from...
Ask These Five Questions for Data Resilience
The CISO’s Mandate: Five Critical Questions to Ask Your Storage Provider for Data Resilience https://t.co/O79CRe7P1i
Securely Integrate AI Agents Into Your Workforce
AI agents are joining the workforce, so how should organizations manage and secure them? https://t.co/4tsBSzKgf5
Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab
German authorities have identified 31‑year‑old Russian Daniil Maksimovich Shchukin as the elusive “UNKN” who led the notorious ransomware groups GandCrab and REvil. Prosecutors say Shchukin and associate Anatoly Kravchuk extorted nearly €2 million (≈$2.2 million) in two dozen attacks, causing over €35 million...
Less Reliable Than Fuzzers, Yet Occasionally Luckier
They are exactly like fuzzers except not as reliable. They can get lucky faster though sometimes.
Leadership Gaps Fuel Cloud Security Breaches, Says Analyst Firozan
Faranak Firozan, a cloud‑security analyst, warned that leadership failures, not technology gaps, are the primary driver of recent high‑profile cloud breaches. In a Santa Clara briefing on April 5, 2026, she argued that unclear priorities, fragmented accountability and misaligned incentives...
UK Ransomware Ban Threatens FinTech Firms Amid 88% Cybercrime Surge
Britain’s pending ransomware‑payment ban arrives as cybercrime incidents have surged 88% to 1.46 million, outpacing police staffing growth of 31%. The clash between tighter rules and limited enforcement threatens fintech firms that process payments and manage compliance.

Pasig Mayor Warns Public vs AI Video Using His Face
Pasig City Mayor Vico Sotto used social media to alert residents that an AI‑generated video featuring his likeness is promoting an illegal gambling website. He warned that deepfake videos are increasingly realistic, making it harder for victims to distinguish authentic...

From RAG to Zero‑Trust: Verifying Hostile LLM Memory
“i came in thinking I’d build a RAG system. i left with a zero-trust verification pipeline that treats the LLM’s parametric memory as hostile.” 👀 🔗 https://t.co/nFZBhpfUKq https://t.co/HYoRr2wYhf
LinkedIn Scams: An Ecosystem of Identity Theft and Fraud
LinkedIn scams go beyond fake posts or “I’m grateful” stories; they form an ecosystem of identity abuse, data harvesting, and financial fraud.
Using A VPN Could Subject You To Government Surveillance, Senators Warn [Roundup]
U.S. senators have cautioned that using commercial VPNs, many of which are foreign‑owned, could inadvertently waive privacy protections and expose Americans to government surveillance. The Department of Homeland Security notes billions are spent each year on such services, highlighting potential...
Meta Halts AI Training After Data Breach Exposes Secrets
Meta freezes AI data work after breach puts training secrets at risk https://t.co/WtjqyiuUAu via @thenextweb
User Seeks Help Recovering Hijacked X Account
Hey @nikitabier my friend JT’s X account got taken over. It was @tcmllc I can send over any details via DM Can you help us out?

Funniest/Most Insightful Comments Of The Week At Techdirt
Techdirt’s weekly roundup highlighted the most insightful and funniest reader comments, ranging from a security analysis of the White House’s new app to sharp legal critiques of the Murthy ruling. The editorial spotlight featured a deep dive into Virginia’s controversial...
Senators Warn VPN Use May Invite Government Surveillance
Using A VPN Could Subject You To Government Surveillance, Senators Warn [Roundup] - View from the Wing https://t.co/hJwQPvAsyq
Iran’s Charming Kitten Exploits Insiders and Low‑tech Tricks
Iran’s Charming Kitten group relies on deception, insider access, and low-tech methods to steal trade secrets and compromise systems. https://t.co/8jKdiH2bzt
Alcatraz Raises $50 Million Series B for AI‑Powered Facial Authentication in Commercial Buildings
Alcatraz, the Cupertino‑based AI security startup, announced a $50 million Series B led by BlackPeak Capital, Cogito Capital and Taiwania Capital. The funding will accelerate its Rock™ facial authentication system, which replaces badges and PINs with privacy‑first AI, across data centers,...
Valid Finding Reveals Overlooked Cookie Injection Requirement
The finding is valid but we need to have a cookie injection on the target or its subdomains but I noticed something the AI didn’t notice…yes AI with humans or spend a lot a lot of tokens.
UK Tightens Energy Cybersecurity After Poland Attack
UK defining stronger energy cybersecurity rules after Poland attack #energysky -- via pv magazine global: https://t.co/UAgNu4x2di
Anthropic’s Claude Code Leak: Why the Instinct to Fire Someone Is the Lazy Response
Anthropic unintentionally released nearly 2,000 Claude Code source files, which were quickly copied and viewed 29 million times online. The company framed the incident as a human‑error packaging issue and confirmed no employee was dismissed. CEO Boris Cherny emphasized that the...
Hope Hyperliquid Is Conducting Emergency Security Review
I really hope Hyperliquid is in a war room right now assuming they’ve already been compromised and reviewing every last thing they’ve done for the last year and a half …

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 91
The Security Affairs Malware Newsletter Round 91 aggregates the latest high‑impact malware research, spotlighting a new macOS infostealer called Infiniti that leverages ClickFix and Python/Nuitka, and a WebSocket‑based pivoting implant named RoadK1ll. It also details a series of supply‑chain compromises of...