Know What's Happening in Cybersecurity

Today's Cybersecurity Pulse

Anthropic CEO meets White House over federal access to Mythos AI

Anthropic CEO Dario Amodei will meet White House chief of staff Susie Wiles to discuss government access to the company's Mythos AI model, which can discover and exploit zero‑day vulnerabilities. The meeting follows a Pentagon‑imposed blacklist after Amodei refused to lift safety restrictions, while Treasury, intelligence agencies and CISA are already testing the model.

PgEdge Launches MCP Server for Postgres, Pushing Message‑Based Protocol Over APIs for AI Agents
NewsApr 3, 2026

PgEdge Launches MCP Server for Postgres, Pushing Message‑Based Protocol Over APIs for AI Agents

pgEdge announced a production‑ready MCP Server for Postgres, positioning a message‑based communication protocol as a superior alternative to traditional APIs for AI agents. The service promises built‑in security, deep schema introspection and reduced token consumption, aiming to curb hallucinations and...

By Pulse
Axios Npm Supply‑chain Breach Exposes Millions of Developers to North Korean‑linked RAT
NewsApr 3, 2026

Axios Npm Supply‑chain Breach Exposes Millions of Developers to North Korean‑linked RAT

A compromised Axios maintainer account allowed attackers to publish malicious versions of the popular JavaScript library, injecting a remote‑access trojan that reached an estimated 180 million weekly downloads. The three‑hour window before removal highlights the fragility of open‑source supply chains and...

By Pulse
Finance of America Faces Early Data Breach Class Action
NewsApr 3, 2026

Finance of America Faces Early Data Breach Class Action

A Texas federal court received a class‑action lawsuit alleging Finance of America suffered a data breach two weeks ago. Consumer Melanie Place claims the ransomware group Word Leaks accessed customers’ personal data, including Social Security numbers. The suit is notable for...

By National Mortgage News
Naoris Protocol's Quantum-Resistant Blockchain Goes Live as Bitcoin and Ethereum Face 'Q-Day' Threats
NewsApr 3, 2026

Naoris Protocol's Quantum-Resistant Blockchain Goes Live as Bitcoin and Ethereum Face 'Q-Day' Threats

Naoris Protocol launched a quantum‑resistant mainnet built on NIST‑approved post‑quantum algorithms, marking its shift from proof‑of‑concept to production. The network has already validated over 100 million transactions and mitigated more than 603 million threats during testing. Its debut comes as Bitcoin and...

By CoinDesk
Understanding the Risks of OpenClaw
NewsApr 3, 2026

Understanding the Risks of OpenClaw

OpenClaw AI Agent Platform functions as an orchestration layer rather than a standalone cloud service, providing the plumbing for agents to interact with external models and enterprise systems. While it can be run locally, its real value emerges only when...

By InfoWorld
The Cyber Express Weekly Roundup: Ransomware, and Supply Chain Breaches Surge
NewsApr 3, 2026

The Cyber Express Weekly Roundup: Ransomware, and Supply Chain Breaches Surge

The Cyber Express weekly roundup highlights a sharp rise in ransomware incidents and supply‑chain compromises across multiple sectors. High‑profile breaches include a ransomware intrusion at Hasbro, a malicious package update that hit AI startup Mercor via the LiteLLM project, and...

By The Cyber Express
Your Token Was Stolen. Now What?
BlogApr 3, 2026

Your Token Was Stolen. Now What?

The article warns that stolen JWTs let attackers impersonate users until the token expires, exposing a critical weakness in many API authentication flows. It outlines the typical login sequence, then highlights how tokens stored in insecure locations or with long...

By Better Engineers
A New Open-Source Protocol Wants to End the War Between Encryption and Safety
NewsApr 3, 2026

A New Open-Source Protocol Wants to End the War Between Encryption and Safety

A new open‑source framework called the Open Moderation Safety Protocol (OMSP) proposes to reconcile end‑to‑end encryption with content safety by performing all classification locally on the user’s device or a platform‑controlled node. The protocol uses a three‑tier pipeline—pattern matching, a...

By TechBullion
TCCA White Paper Gives Direction on Building Cybersecurity Into Critical Communications
BlogApr 3, 2026

TCCA White Paper Gives Direction on Building Cybersecurity Into Critical Communications

The Telecoms Critical Communications Association (TCCA) has published its first white paper on cybersecurity for mission‑critical broadband networks, marking a key step toward securing 4G and 5G‑enabled communications. The document outlines international standards, frameworks and deployment models, and stresses the...

By TelecomDrive
Keysight Introduces SBOM Manager for Cybersecurity Compliance
NewsApr 3, 2026

Keysight Introduces SBOM Manager for Cybersecurity Compliance

Keysight has launched an SBOM Manager platform that automates the creation and upkeep of software bills of materials for manufacturers facing tighter cybersecurity regulations. The tool scans binaries, firmware and containerised applications, linking components to multiple vulnerability databases and supporting...

By EE Times Europe
Which Messaging App Takes the Most Limited Approach to Permissions on Android?
NewsApr 3, 2026

Which Messaging App Takes the Most Limited Approach to Permissions on Android?

A recent analysis of Android versions of Messenger, Signal and Telegram reveals stark differences in permission requests and data handling. Messenger requests the most permissions (87 total, 24 dangerous), while Telegram requests the fewest (71 total) but the highest number...

By Help Net Security
Cambridge Global Advisors Wins Australian Grant for Pacific Cybersecurity
NewsApr 3, 2026

Cambridge Global Advisors Wins Australian Grant for Pacific Cybersecurity

Cambridge Global Advisors has secured an Australian Department of Foreign Affairs and Trade grant to launch the Pacific Women in Cyber (PWiC) program, an 18‑month initiative delivering cybersecurity training and internships to women in Tonga, Fiji and Samoa. Funded under...

By Vietnam Investment Review (VIR)
Anthropic’s Claude Code Source‑map Leak Exposes Enterprise Features, Sparking Compliance Concerns
NewsApr 3, 2026

Anthropic’s Claude Code Source‑map Leak Exposes Enterprise Features, Sparking Compliance Concerns

Anthropic inadvertently published a 59.8 MB source‑map file for its Claude Code CLI on npm, exposing the full TypeScript code, unreleased features and internal attribution controls. The leak hits a product that generates over $1 billion in run‑rate revenue and serves regulated...

By Pulse
Data Security Posture Management Has Become Essential for Governments
NewsApr 3, 2026

Data Security Posture Management Has Become Essential for Governments

State and local governments are rapidly expanding multicloud environments and adopting generative AI, yet many lack clear visibility into where sensitive citizen data resides. Data Security Posture Management (DSPM) emerges as a solution, continuously discovering, classifying, and monitoring data across...

By StateTech Magazine
Guardian AI Emerges: Second‑layer Agents Monitor and Secure Systems
SocialApr 3, 2026

Guardian AI Emerges: Second‑layer Agents Monitor and Secure Systems

The category is called guardian AI, or supervisor agents. The idea: deploy a second layer of AI to watch what the first layer is doing. ServiceNow has the most developed commercial product here, sold as part of its AI Control...

By Shashi Bellamkonda
Check City Notifies 322,687 People of March 2025 Data Breach
NewsApr 3, 2026

Check City Notifies 322,687 People of March 2025 Data Breach

Check City, a payday‑loan provider, disclosed that a March 2025 cyber‑attack exposed personal data of 322,687 individuals. The breach compromised names, Social Security numbers, government IDs, financial account details, credit and debit card numbers, dates of birth, and addresses. A...

By PYMNTS
How the World Got Owned Episode 2: The 1990s, Part One
PodcastApr 3, 202646 min

How the World Got Owned Episode 2: The 1990s, Part One

Episode 2 of "How the World Got Owned" dives into the 1990s hacking scene, highlighting the rise of hacker conventions like DEF CON and Black Hat, the emergence of a vibrant but ego‑driven community, and the clash between hackers and...

By Risky Business
Bug Bounties Aren’t Universal, AI Hype Is Overblown
SocialApr 3, 2026

Bug Bounties Aren’t Universal, AI Hype Is Overblown

Had a great conversation with Mackenzie Jackson from Aikido Security on The Secure Disclosure — we got into some contrarian takes: not every org should run a bug bounty (yes, from the Bugcrowd founder), AI slop is really just 2014...

By Casey Ellis
Real‑Time Location Tracking Threats: How to Protect Yourself
SocialApr 3, 2026

Real‑Time Location Tracking Threats: How to Protect Yourself

240 - Warning, They Can Know Where You Are in Real Time. How to Protect Yourself #ArtificialDecisions #MCC https://t.co/LUlIN36Wjm

By M.Camisani-Calzolari
Malicious Android Apps Reach 2.3 M Downloads, Deploy Undeletable NoVoice Malware
NewsApr 3, 2026

Malicious Android Apps Reach 2.3 M Downloads, Deploy Undeletable NoVoice Malware

McAfee researchers identified 50 malicious Android apps on Google Play that have been downloaded 2.3 million times. The apps install the NoVoice strain, which gains root, rewrites system libraries and survives factory resets, exposing users in Africa, India, the U.S. and...

By Pulse
Outlook Mobile 2FA: Frequently Fails, Users Frustrated
SocialApr 3, 2026

Outlook Mobile 2FA: Frequently Fails, Users Frustrated

Question - is it just me - or does the @Microsoft Outlook Mobile based 2 factor authorization ever work?

By Holger Müller
Use AI Defensively To
SocialApr 3, 2026

Use AI Defensively To

Cyber attacks launched by malicious humans using AI are a very real AI risk. The best way to guard against them is to use AI to proactively find vulnerabilities in our systems and harden them, along with parallel efforts in...

By Ramez Naam
Digital Forensics and Incident Response (DFIR): A CISO’s Guide
BlogApr 2, 2026

Digital Forensics and Incident Response (DFIR): A CISO’s Guide

Digital Forensics and Incident Response (DFIR) combines evidence collection with threat containment, forming a critical capability for CISOs. The guide outlines core functions—evidence preservation, malware and network analysis, and emerging cloud forensics—while stressing the need for pre‑enabled logging. It recommends...

By Erdal Ozkaya’s Cybersecurity Blog
OT Network Segmentation: A Practical Guide for Security Teams
BlogApr 2, 2026

OT Network Segmentation: A Practical Guide for Security Teams

Network segmentation is the most effective control for safeguarding operational technology (OT) environments, limiting attackers to isolated zones rather than allowing lateral movement. Implementing segmentation in OT differs from IT because industrial protocols and legacy equipment resist typical firewall solutions...

By Erdal Ozkaya’s Cybersecurity Blog
Incident Response Planning for Business Continuity
BlogApr 2, 2026

Incident Response Planning for Business Continuity

Organizations lacking a tested incident response plan face escalating costs, reputational damage, and evidence loss during cyber attacks. The article outlines the NIST incident response lifecycle—preparation, detection, containment, and post‑incident review—and stresses integrating business continuity to meet recovery time objectives....

By Erdal Ozkaya’s Cybersecurity Blog
Americans' Passports Purportedly Stolen in Hacktivist Attack Against Dubai Airport
NewsApr 2, 2026

Americans' Passports Purportedly Stolen in Hacktivist Attack Against Dubai Airport

Nasir Security, a hacktivist group linked to Iran, claimed to have stolen a large data set from Dubai International Airport after a months‑long intrusion. The breach includes passport photos of American, Arab and Emirati travelers, as well as luggage and...

By SC Media
When Your Own Eyes Turn Against You: How Compromised Security Cameras and IoT/OT Devices Become Tools for Your Attackers
NewsApr 2, 2026

When Your Own Eyes Turn Against You: How Compromised Security Cameras and IoT/OT Devices Become Tools for Your Attackers

Security cameras, IoT and OT devices are increasingly being compromised and repurposed as attack vectors, enabling nation‑state reconnaissance, espionage, ransomware pivots, and massive botnets. Recent incidents include Iranian hackers hijacking Hikvision cameras during missile strikes, Russian operatives streaming compromised webcams...

By Security Boulevard
PSA: Anyone with a Link Can View Your Granola Notes by Default
NewsApr 2, 2026

PSA: Anyone with a Link Can View Your Granola Notes by Default

Granola, an AI‑powered note‑taking app, shares notes publicly by default to anyone with a link, contradicting its claim of private‑by‑default. Users can change the setting to “Only my company” or “Private,” but the default exposes potentially sensitive meeting content. The...

By The Verge Transportation
Quantum Encryption’s Hidden Weakness Exposed by New Eavesdropping Attack
BlogApr 2, 2026

Quantum Encryption’s Hidden Weakness Exposed by New Eavesdropping Attack

Researchers at the School of Physics and Astronomy have unveiled a new eavesdropping technique called Manipulate-and-Observe that targets the classical reconciliation phase of quantum key distribution (QKD). By intercepting between 0% and 11% of photons and injecting subtle errors, the...

By Quantum Zeitgeist
The DOJ’s Cyber FCA Playbook Is Working as Enforcement Triples and Shows No Signs of Slowing
BlogApr 2, 2026

The DOJ’s Cyber FCA Playbook Is Working as Enforcement Triples and Shows No Signs of Slowing

The Department of Justice’s cyber fraud initiative has accelerated, with nine False Claims Act settlements in FY 2025 totaling more than $52 million—a three‑fold increase over the prior two years. Enforcement targets misrepresentations of cybersecurity compliance rather than actual data breaches, implicating...

By ComplexDiscovery
Agentic Development Security: Why AppSec Needs A New Operating Model
NewsApr 2, 2026

Agentic Development Security: Why AppSec Needs A New Operating Model

Application security is being reshaped by faster exploit cycles and the rise of AI‑driven coding agents. Traditional testing tools now detect vulnerabilities but struggle to provide real‑world context such as exploitability and business impact. Large language models are enabling richer...

By Forrester Blogs
Why Australia’s Tech Sovereignty Needs Smart Partnerships
NewsApr 2, 2026

Why Australia’s Tech Sovereignty Needs Smart Partnerships

Mark Hile, Managing Director of Datacom Infrastructure Products, warns that rising cyber threats, geopolitical risk and supply‑chain disruptions are forcing Australia to rethink its digital infrastructure. He argues the country must double down on regionally‑owned, sovereign technology or cede strategic...

By CIO.com
Amazon Middle East Datacenter Suffers Second Drone Hit as Iran Steps up Attacks
NewsApr 2, 2026

Amazon Middle East Datacenter Suffers Second Drone Hit as Iran Steps up Attacks

Iranian drones struck Amazon's ME‑SOUTH‑1 data center in Bahrain for the second time this month, igniting a fire and prompting AWS to label the incident as the lowest level of service disruption. The attack follows a March strike on the...

By Network World
How Do NHIs Build Trust in Cloud Security?
NewsApr 2, 2026

How Do NHIs Build Trust in Cloud Security?

Machine (non‑human) identities are becoming the backbone of cloud security, requiring end‑to‑end lifecycle management from discovery to remediation. Organizations that integrate NHI controls into a unified cybersecurity strategy can close gaps that expose sensitive data, especially in regulated sectors like...

By Security Boulevard
Agentic Era Demands New Trust Layer, ZKML Offers Solution
SocialApr 2, 2026

Agentic Era Demands New Trust Layer, ZKML Offers Solution

Finally going to write a bit more about this (in tomorrow's Clouded Judgement). A snippet of what I wrote: The way I think about it: every major platform shift has required a corresponding trust layer. The internet needed SSL/TLS. Mobile needed...

By Jamin Ball
Broadcom Donates Velero to CNCF Sandbox, Elevating Kubernetes Data‑Protection Tools
NewsApr 2, 2026

Broadcom Donates Velero to CNCF Sandbox, Elevating Kubernetes Data‑Protection Tools

Broadcom has transferred ownership of the open‑source backup/restore project Velero to the Cloud Native Computing Foundation (CNCF) Sandbox. The donation, announced at KubeCon Europe 2026, is intended to remove perceived vendor lock‑in and accelerate Velero’s evolution into a de‑facto standard for Kubernetes...

By Pulse
Supply‑Chain Attack Hijacks TrueConf Video‑Conferencing Used by Southeast Asian Governments
NewsApr 2, 2026

Supply‑Chain Attack Hijacks TrueConf Video‑Conferencing Used by Southeast Asian Governments

Security firm Check Point disclosed a sophisticated supply‑chain intrusion that exploited a zero‑day in TrueConf, a video‑conferencing platform favored by Southeast Asian governments and militaries. The flaw, tracked as CVE‑2026‑3502 with a 7.8 severity score, was patched in version 8.5.3...

By Pulse
ShinyHunters Hackers Claim Theft of 3M+ Cisco Records, Threaten Public Leak
NewsApr 2, 2026

ShinyHunters Hackers Claim Theft of 3M+ Cisco Records, Threaten Public Leak

ShinyHunters, identified as UNC6040, issued a final warning to Cisco, demanding contact before April 3 2026 or face a public data leak. The group alleges it has exfiltrated more than three million Salesforce records, along with GitHub repositories, AWS storage buckets, and...

By HackRead
How Ecommerce Brands Should Budget for Penetration Testing in 2026 Without Under-Scoping Risk
BlogApr 2, 2026

How Ecommerce Brands Should Budget for Penetration Testing in 2026 Without Under-Scoping Risk

E‑commerce brands in 2026 must treat penetration testing as a revenue‑protection expense rather than a simple compliance line‑item. Modern stacks combine headless front‑ends, APIs, third‑party services, and mobile apps, expanding the attack surface far beyond the public storefront. Budgeting errors...

By eCommerce Fastlane
What Internal Audit Needs to Know About Zero Trust Architecture
BlogApr 2, 2026

What Internal Audit Needs to Know About Zero Trust Architecture

Zero Trust Architecture (ZTA) is reshaping security by demanding continuous verification of users, devices, and connections rather than trusting network perimeters. Internal auditors must evaluate ZTA implementations against standards such as MFA enforcement, least‑privilege access, micro‑segmentation, and immutable logging to...

By Internal Audit 360
Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials
NewsApr 2, 2026

Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials

Hackers are exploiting the critical CVE‑2025‑55182 flaw in Next.js to gain remote code execution and compromise at least 766 hosts across several cloud providers. The UAT‑10608 threat cluster deploys a multi‑phase dropper that harvests SSH keys, cloud IAM tokens, API...

By The Hacker News
ConductorOne Extends Reach of Identity Governance to AI
NewsApr 2, 2026

ConductorOne Extends Reach of Identity Governance to AI

ConductorOne has broadened its identity governance platform to cover AI tools, agents and integrations using the Model Context Protocol, and has linked the platform with CrowdStrike Falcon Next‑Gen Identity Security for real‑time threat intelligence. A recent survey shows 95% of organizations...

By Security Boulevard
Even Tech‑Savvy Users Still Fall for Phishing Scams
SocialApr 2, 2026

Even Tech‑Savvy Users Still Fall for Phishing Scams

I just analyzed this BofA text, and it’s a perfect example of why even tech-savvy people get burned. Why do we still fall for these?

By Raquel (Deep Search)
CrystalX RAT Bundles Prankware to Taunt Victims During Data Theft
SocialApr 2, 2026

CrystalX RAT Bundles Prankware to Taunt Victims During Data Theft

CrystalX RAT comes with a handful of prankware, allowing hackers to tease their victims as they steal their data. https://t.co/aOjjo0ApuY

By TechRadar
Indirect Prompt Injection Threats and Google’s Defense Strategies
SocialApr 2, 2026

Indirect Prompt Injection Threats and Google’s Defense Strategies

Indirect prompt injection "enables the attacker to influence the behavior of an LLM by injecting malicious instructions into the data or tools used by the LLM as it completes the user’s query." https://t.co/smO5fyBfLT < what @google Security does to...

By Richard Seroter
Don’t Trust Your Supply Chain Blindly—Follow Docker’s Guidance
SocialApr 2, 2026

Don’t Trust Your Supply Chain Blindly—Follow Docker’s Guidance

These recent software supply chain breaches are worrisome. How can we avoid assuming trust where we shouldn't? @Docker has a good post up with recommendations for engineering teams ... https://t.co/O5Mfag8N4y

By Richard Seroter
FCC Cracks Down on Foreign Bank Impersonation Scams
SocialApr 2, 2026

FCC Cracks Down on Foreign Bank Impersonation Scams

FCC Acts to Protect U.S. Consumers from Bank Impersonation Scams Linked to Suspicious Foreign Call Traffic https://t.co/4LNmknNXR0

By Brendan Carr
Iran Claims Cyberattack on Oracle, AWS Data Centers
SocialApr 2, 2026

Iran Claims Cyberattack on Oracle, AWS Data Centers

Iran says that they have hit Oracle datacenter in Dubai, AWS datacenter in Bahrain - CNBC (just now)

By Sarbjeet Johal
AI Is Simplifying Cybercrime; Future Threats Loom
SocialApr 2, 2026

AI Is Simplifying Cybercrime; Future Threats Loom

#AI is already making online crimes easier. It could get much worse. (MIT Technology Review) #JVGpost https://t.co/CbJaHfE8I9 https://t.co/Z89pKDgCWW

By James Gingerich