Know What's Happening in Cybersecurity

Today's Cybersecurity Pulse

Bol denies alleged fake data breach of 400,000 customers

A hacker claimed to have stolen personal data of 400,000 Belgian Bol customers and posted the alleged dataset for sale on a dark‑web forum for €100 (about $109). Bol, owned by Ahold Delhaize, publicly denied any breach and said it had no knowledge of the alleged data. The story was reported by Retail Detail and SC Media.

Cybersecurity Unicorn Torq Is in Talks to Acquire This AI Startup for $50 Million
NewsApr 7, 2026

Cybersecurity Unicorn Torq Is in Talks to Acquire This AI Startup for $50 Million

Cybersecurity unicorn Torq, valued at $1.2 billion after a $140 million funding round, is in advanced talks to acquire Boston‑based AI security assistant Jit for about $50 million. The deal would merge Torq’s large security command center with Jit’s automated tools to create...

By Business Insider – Finance
FIRESIDE CHAT: Geopolitical Turmoil, Rising AI Risk Add a New Layer to Enterprise Cyber Defense
BlogApr 7, 2026

FIRESIDE CHAT: Geopolitical Turmoil, Rising AI Risk Add a New Layer to Enterprise Cyber Defense

At RSAC 2026, enterprise security leaders highlighted a dual crisis: a surge of unsanctioned AI tools and growing geopolitical distrust of U.S.-controlled cloud services. Skyhigh Security’s Sanjay Castelino reported that European firms are reassessing reliance on American cloud infrastructure, demanding...

By The Last Watchdog
Airrived Named Among Only 11 Startups in Gartner’s “Emerging Tech: AI Vendor Race — Startups to Watch in Agentic AI”
NewsApr 7, 2026

Airrived Named Among Only 11 Startups in Gartner’s “Emerging Tech: AI Vendor Race — Startups to Watch in Agentic AI”

Airrived has been named one of only 11 startups in Gartner’s March 2026 report on emerging agentic AI, standing out as the sole company purpose‑built for cybersecurity and IT operations. The Gartner evaluation covered 129 startups, and Airrived’s Agentic OS platform...

By AiThority » Sales Enablement
Data Breach Exposes Jones Day Client Files After Ransomware Threat
NewsApr 7, 2026

Data Breach Exposes Jones Day Client Files After Ransomware Threat

Jones Day disclosed a data breach that exposed confidential client files after a ransomware threat forced the firm to shut down parts of its network. The intrusion, discovered in early April 2026, affected both internal documents and client communications, prompting...

By The Lawyer (UK)
FCC Proposes Extending Ban on Chinese Networking Gear to All Products
NewsApr 7, 2026

FCC Proposes Extending Ban on Chinese Networking Gear to All Products

The Federal Communications Commission has issued a proposal to expand its existing ban on Chinese networking gear, covering not only new models but also equipment previously authorized. The move targets Huawei, ZTE, Hikvision, Dahua, Hytera and other firms, prompting comments...

By Pulse
Family Firms More Exposed To Cybersecurity Risks
BlogApr 7, 2026

Family Firms More Exposed To Cybersecurity Risks

Family businesses are increasingly exposed to the same cyber threats as large corporations, yet many still treat security as a technical afterthought. High trust, legacy technology, and informal governance create unique vulnerabilities that can lead to insider breaches and ransomware...

By Family Business United
Metro Cities Halt Flock Safety License‑Plate Readers Amid Privacy Outcry
NewsApr 7, 2026

Metro Cities Halt Flock Safety License‑Plate Readers Amid Privacy Outcry

Dunwoody, Georgia, and several other U.S. cities have voted to defer renewal or shut down Flock Safety’s automated license‑plate‑reader cameras after residents raised privacy and security concerns. The move puts roughly $860,000 of recent municipal spending under review and signals...

By Pulse
Tor-Backed ClickFix Campaign Drops Node.js RAT on Windows
NewsApr 7, 2026

Tor-Backed ClickFix Campaign Drops Node.js RAT on Windows

Hackers have revived the ClickFix social‑engineering scheme to drop a sophisticated Node.js‑based remote access Trojan on Windows machines. The campaign uses a fake CAPTCHA page to execute a Base64‑encoded PowerShell command that silently installs a malicious MSI containing a full...

By GBHackers On Security
Google Says Quantum Computer Could Crack Bitcoin in Under 9 Minutes, Prompting Urgent Security Push
NewsApr 7, 2026

Google Says Quantum Computer Could Crack Bitcoin in Under 9 Minutes, Prompting Urgent Security Push

Google researchers released a whitepaper indicating that a sufficiently powerful quantum machine could derive a Bitcoin private key in under nine minutes, with a 41% success probability. The finding compresses the timeline for a practical quantum attack to as early...

By Pulse
Fake Buffett, Real Reputation Risk: How Deepfakes Are Reshaping the Cyber Landscape
NewsApr 7, 2026

Fake Buffett, Real Reputation Risk: How Deepfakes Are Reshaping the Cyber Landscape

In November 2025 a TikTok video featuring a hyper‑realistic deepfake of Warren Buffett promoted crypto giveaways, exposing how synthetic media can be weaponized for fraud. The clip amassed over 17,000 subscribers before the deception was uncovered, highlighting the speed at...

By Risk & Insurance
Supply Chain Security Is Now a Board-Level Issue: Here’s What CSOs Need to Know
NewsApr 7, 2026

Supply Chain Security Is Now a Board-Level Issue: Here’s What CSOs Need to Know

Supply chain security has moved from a niche technical issue to a board‑level priority, driven by stringent regulations like the European Cyber Resilience Act and U.S. EO 14028. Open‑source components now appear in 97% of commercial applications, with 86% harboring vulnerabilities,...

By CSO Online
Hong Kong Police Can Force You to Reveal Your Encryption Keys
BlogApr 7, 2026

Hong Kong Police Can Force You to Reveal Your Encryption Keys

Hong Kong police have gained the legal authority to compel individuals to disclose encryption keys for computers, phones, hard drives and other devices under a revised National Security Law framework. The power extends to anyone transiting the city’s airport, and...

By Schneier on Security
Infinite Electronics Facility Earns CMMC Level 2
NewsApr 7, 2026

Infinite Electronics Facility Earns CMMC Level 2

Infinite Electronics announced that its Hayden, Idaho facility has earned Cybersecurity Maturity Model Certification (CMMC) Level 2 after a third‑party audit. The certification validates compliance with all 110 NIST SP 800‑171 controls required to protect Controlled Unclassified Information and Federal Contracting Information....

By Engineering.com
Cloudflare and GoDaddy Ink Partnership to Rein in AI Agents Reshaping Web Traffic
NewsApr 7, 2026

Cloudflare and GoDaddy Ink Partnership to Rein in AI Agents Reshaping Web Traffic

Cloudflare and GoDaddy announced a partnership that extends Cloudflare’s AI traffic‑control suite to GoDaddy’s roughly 20 million small‑business websites. The deal adds the Web Bot Auth system, which uses cryptographic verification to let legitimate bots prove their identity while blocking impersonators....

By Adweek
As Breakout Time Accelerates, Prevention-First Cybersecurity Takes Center Stage
NewsApr 7, 2026

As Breakout Time Accelerates, Prevention-First Cybersecurity Takes Center Stage

Cyber attackers are leveraging AI to accelerate ransomware and lateral movement, cutting average breakout time to about 30 minutes—29% faster than a year ago. Roughly 80% of ransomware‑as‑a‑service groups now embed AI or automation in their kits, enabling rapid credential...

By WeLiveSecurity
Cloud-First Vs. Sovereign-First: Navigating the Trade-Off
NewsApr 7, 2026

Cloud-First Vs. Sovereign-First: Navigating the Trade-Off

Enterprises are increasingly adopting sovereign cloud solutions to meet data‑residency mandates, mitigate geopolitical risk, and reduce reliance on foreign cloud providers. Gartner defines sovereign cloud as locally hosted services that ensure legal and operational autonomy, a definition echoed by Forrester...

By Network World
U.S. CISA Adds a Flaw in Fortinet FortiClient EMS to Its Known Exploited Vulnerabilities Catalog
BlogApr 7, 2026

U.S. CISA Adds a Flaw in Fortinet FortiClient EMS to Its Known Exploited Vulnerabilities Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added Fortinet FortiClient EMS vulnerability CVE-2026-35616 to its Known Exploited Vulnerabilities (KEV) catalog. The flaw, rated 9.1 on the CVSS scale, enables unauthenticated attackers to bypass authentication via an API and...

By Security Affairs
SEALSQ and IC’Alps Achieve Key Common Criteria Certification Steps
NewsApr 7, 2026

SEALSQ and IC’Alps Achieve Key Common Criteria Certification Steps

SEALSQ Corp and its subsidiary IC’Alps announced major progress in their Common Criteria (CC) security certification programs. Independent evaluator SERMA confirmed that the QS7001 Secure Element achieved a PASS on fault‑injection and side‑channel resistance tests, moving the platform toward full...

By IoT Now – Smart Buildings
Comp AI: The Open-Source Way to Get Compliant with SOC 2, ISO 27001, HIPAA and GDPR
NewsApr 7, 2026

Comp AI: The Open-Source Way to Get Compliant with SOC 2, ISO 27001, HIPAA and GDPR

Comp AI launches an open‑source compliance platform that automates SOC 2, ISO 27001, HIPAA and GDPR readiness. The tool combines an AI‑driven policy editor, automated evidence collection, and a device‑agent that monitors encryption, antivirus, password and screen‑lock settings. Core code is released...

By Help Net Security
ICO Urges Parents to Treat Online Privacy Like Road Safety
NewsApr 7, 2026

ICO Urges Parents to Treat Online Privacy Like Road Safety

The UK Information Commissioner’s Office has launched the “Switched on to Privacy” campaign, urging parents to treat children’s online privacy with the same vigilance as road safety and stranger danger. New research of 1,000 parents shows 75% fear their kids...

By DecisionMarketing
Maidar Secure, Strike48 Bring Agentic AI to the SOC
NewsApr 7, 2026

Maidar Secure, Strike48 Bring Agentic AI to the SOC

Maidar Secure has teamed up with Strike48 to embed the latter’s agentic AI platform into its managed security services and SOC operations. The integration promises autonomous threat detection, real‑time attack simulation and machine‑speed incident response, turning traditional reactive defenses into...

By TechCentral (South Africa)
I2P Vs. Tor: Defeating Global Adversary Deanonymization of Your Bitcoin Node.
BlogApr 7, 2026

I2P Vs. Tor: Defeating Global Adversary Deanonymization of Your Bitcoin Node.

The post argues that routing Bitcoin node traffic solely through Tor no longer guarantees anonymity against modern Global Passive Adversaries (GPAs). It explains how state‑level actors can use timing and traffic‑correlation attacks to link transactions to a user’s physical IP....

By In Bitcoin We Trust Newsletter
Germany Names Suspected Leader of REvil and GandCrab Ransomware Gangs
NewsApr 7, 2026

Germany Names Suspected Leader of REvil and GandCrab Ransomware Gangs

German authorities have identified a 31‑year‑old Russian, Daniil Maksimovich Shchukin, as the suspected leader of the REvil and GandCrab ransomware gangs. The BKA says he directed at least 130 attacks in Germany from 2019‑2021, extorting roughly €2 million (about $2.1 million) and...

By The Cyber Express
Who’s Logging In? [OMITB]
PodcastApr 7, 20263 min

Who’s Logging In? [OMITB]

In this episode of Only Malware in the Building, host Selina Larson and guests Keith Malarski and Dave discuss the rapid rise of identity‑based attacks, noting that identity‑related root causes now outpace traditional malware. They cite recent reports from Sophos,...

By Hacking Humans
When Silicon Got Serious About Security
NewsApr 7, 2026

When Silicon Got Serious About Security

The article traces cryptography’s evolution from the 1970s Data Encryption Standard (DES) to today’s Advanced Encryption Standard (AES) and Elliptic Curve Cryptography (ECC). It highlights how silicon’s exponential speed gains exposed DES’s 56‑bit weakness, prompting the 1998 Deep Crack break. The...

By ITWeb (South Africa) – Public Sector
Exclusive-Russia Supplies Iran with Cyber Support, Spy Imagery to Hone Attacks, Ukraine Says
NewsApr 7, 2026

Exclusive-Russia Supplies Iran with Cyber Support, Spy Imagery to Hone Attacks, Ukraine Says

Russian reconnaissance satellites conducted at least 24 passes over 46 military and critical sites in 11 Middle Eastern countries during March 21‑31, sharing high‑resolution imagery with Iran. The data preceded Iranian missile and drone attacks on bases, including a strike on...

By Al-Monitor
FortiClientEMS Vulnerabilities Under Active Exploitation, Expose Systems to RCE
NewsApr 7, 2026

FortiClientEMS Vulnerabilities Under Active Exploitation, Expose Systems to RCE

Fortinet disclosed two critical vulnerabilities in its FortiClientEMS endpoint management platform that are already being exploited in the wild. CVE-2026-21643 is a SQL injection flaw in the admin interface of version 7.4.4, allowing unauthenticated remote code execution. CVE-2026-35616 is an...

By The Cyber Express
Trump Administration Releases Cyber Strategy
NewsApr 7, 2026

Trump Administration Releases Cyber Strategy

The Trump administration unveiled a new Cyber Strategy for America in March 2026, paired with Executive Order 14390 to intensify federal action against cybercrime. The strategy outlines six pillars—deterrence, streamlined regulation, federal network modernization, critical‑infrastructure protection, technology superiority, and talent...

By EDUCAUSE Review
$20 Billion Lost to Cybercrime as AI and Investment Scams Surge: FBI Report
NewsApr 7, 2026

$20 Billion Lost to Cybercrime as AI and Investment Scams Surge: FBI Report

The FBI’s 2025 Internet Crime Report records a historic $20.8 billion in losses from more than one million complaints. Cyber‑enabled fraud accounted for roughly $17.7 billion, with investment scams—especially cryptocurrency schemes—driving $8.6 billion of that damage. AI‑powered scams emerged as a new threat,...

By The Cyber Express
The Case for Fixing CWE Weakness Patterns Instead of Patching One Bug at a Time
NewsApr 7, 2026

The Case for Fixing CWE Weakness Patterns Instead of Patching One Bug at a Time

CWE is transitioning from a background taxonomy to a core element of vulnerability disclosure, with a growing share of CVE records now including CNA‑provided CWE IDs. Precise, lower‑level CWE mappings are improving root‑cause visibility, enabling teams to target systemic weakness...

By Help Net Security
Jones Day Law Firm Says Hackers Accessed Some Clients’ Data
NewsApr 7, 2026

Jones Day Law Firm Says Hackers Accessed Some Clients’ Data

Jones Day disclosed that the cyber‑criminal group Silent breached its network, accessing dated files for ten clients. The intrusion stemmed from a phishing attack, and the firm confirmed that all impacted clients have been notified. Hackers also exfiltrated internal data...

By Insurance Journal
MyRepublic Launches Email Guard for Singapore SME Protection
NewsApr 7, 2026

MyRepublic Launches Email Guard for Singapore SME Protection

MyRepublic has launched Email Guard, a managed email security service tailored for Singapore’s small and medium‑sized enterprises. The solution, built on Check Point’s threat‑prevention technology, safeguards against phishing, malware, and business‑email compromise across Microsoft 365 and Google Workspace. It offers...

By Vietnam Investment Review (VIR)
Windows 11 Is Phasing Out Old Kernel Drivers: Microsoft Will Permanently End Cross-Signing in April
BlogApr 7, 2026

Windows 11 Is Phasing Out Old Kernel Drivers: Microsoft Will Permanently End Cross-Signing in April

Microsoft announced that, starting with the April 2026 security update, Windows 11 will permanently stop trusting kernel drivers signed under the old Cross‑Signed Program. The change applies to Windows 11 24H2, 25H2, 26H1 and Windows Server 2025, allowing only drivers vetted through the Windows...

By Igor’sLAB
Don’t Wait for 2027 – Make Your Smart Product Security Visible Now
NewsApr 7, 2026

Don’t Wait for 2027 – Make Your Smart Product Security Visible Now

Australia is introducing a national security label for smart devices, slated for a 2027 launch, with an industry pilot beginning in October 2026. The label will provide a clear, comparable security credential at the point of sale, shifting security from...

By iTnews (Australia) – Government
Cambodian Parliament Passes Landmark Cybercrime Law
NewsApr 7, 2026

Cambodian Parliament Passes Landmark Cybercrime Law

Cambodia's parliament approved its first cybercrime law targeting scam centres that have defrauded international victims of billions. The legislation prescribes prison terms of two to ten years and fines up to $250,000 for large‑scale operations. It also criminalises money‑laundering, data...

By iTnews (Australia) – Government
AI-Assisted Fraud Makes Big Debut in FBI's Cybercrime Stats
NewsApr 7, 2026

AI-Assisted Fraud Makes Big Debut in FBI's Cybercrime Stats

The FBI’s 2025 Internet Crime Complaint Centre report introduced AI‑assisted fraud as a distinct category, documenting $893 million in losses. Overall cybercrime losses topped $20 billion, a 26 percent rise from 2024, with investment scams leading at $8.6 billion. AI‑generated content fueled business‑email‑compromise, voice‑cloning,...

By iTnews (Australia) – Government
Jones Day Confirms Limited Breach After Phishing Attack by Silent Ransom Group
NewsApr 7, 2026

Jones Day Confirms Limited Breach After Phishing Attack by Silent Ransom Group

Jones Day, one of the nation’s top law firms, confirmed a limited data breach after the Silent Ransom Group (SRG) posted files for ten clients on a dark‑web leak site. The attackers demanded roughly $13 million to delete the stolen data...

By DataBreaches.net
Turn Fear Into Action: Strengthen Security with AI
SocialApr 7, 2026

Turn Fear Into Action: Strengthen Security with AI

I was afraid this afternoon. Read a security report that a massive cyberattack is coming. Fear causes the human mind to do weird things. My mom, in 1988, thought a massive nuclear war was coming, so joined a Montana suvivalist cult. Had...

By Robert Scoble
Quantum Penetration Testing: Are We Ready Yet?
SocialApr 7, 2026

Quantum Penetration Testing: Are We Ready Yet?

Is It Time For A Quantum Penetration Test? by J Nathaniel Ader @Forbes Learn more: https://t.co/CodfvKavfv #QuantumComputing #EmergingTech #Technology #Innovation #Tech https://t.co/rKyowhOBLq

By Ron van Loon
Malwarebytes Passes First Independent No-Logs VPN Audit, Boosting SaaS Trust
NewsApr 7, 2026

Malwarebytes Passes First Independent No-Logs VPN Audit, Boosting SaaS Trust

Malwarebytes announced that its Privacy VPN has cleared a rigorous, independent audit by security firm X41 D‑Sec, which found no evidence of user‑activity logging. The two‑month white‑box assessment also uncovered and helped fix a critical vulnerability, underscoring the company's commitment...

By Pulse
Every Encryption System Needs a Cryptography Bill of Materials
SocialApr 7, 2026

Every Encryption System Needs a Cryptography Bill of Materials

Cybeats Blog | Cryptography Bill of Materials (CBOM): Why Every Encryption Ecosystem Needs One https://t.co/DGQpWfPZ3F

By Chuck Brooks
Open‑source Tool Simplifies SOC 2, ISO 27001, HIPAA, GDPR Compliance
SocialApr 7, 2026

Open‑source Tool Simplifies SOC 2, ISO 27001, HIPAA, GDPR Compliance

Comp AI: The open-source way to get compliant with SOC 2, #ISO27001, #HIPAA and #GDPR https://t.co/mvwHwvS9mu https://t.co/q7t0s2qhc4

By Eric Vanderburg
Claude Code Leak: Researchers Find First Vulnerability
BlogApr 7, 2026

Claude Code Leak: Researchers Find First Vulnerability

Anthropic unintentionally published a source map that revealed roughly 512,000 lines of Claude Code's TypeScript source. Researchers used the leak to uncover a critical flaw allowing command‑chain bypass of the tool's deny‑rule system after 50 subcommands. The vulnerability could let...

By Notebookcheck
Flowise AI Agent Builder Faces Active CVSS 10 RCE Attack
SocialApr 7, 2026

Flowise AI Agent Builder Faces Active CVSS 10 RCE Attack

Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed https://t.co/aINT8EHBFi https://t.co/SKA564pKd5

By Eric Vanderburg
Unpatched Claude Coding Flaw Lets Attackers Steal Cowork Files
SocialApr 7, 2026

Unpatched Claude Coding Flaw Lets Attackers Steal Cowork Files

Attackers can exfiltrate user files from Cowork by exploiting an unremediated vulnerability in Claude’s coding environment, which now extends to Cowork. The vulnerability was first identified in https://t.co/noHjpUqN1I chat before Cowork existed by Johann Rehberger, who disclosed the vulnerability. It...

By Garry Tan
Pipeline Security Lessons From March Supply Chain Incidents
NewsApr 7, 2026

Pipeline Security Lessons From March Supply Chain Incidents

Between March 19 and March 31, 2026, the TeamPCP threat group executed four supply‑chain attacks that compromised the open‑source scanner Trivy, the IaC scanner Checkmarx KICS, the AI model gateway LiteLLM, and the JavaScript client axios. Each breach leveraged malicious...

By GitLab Blog
Iran's Cyber Arsenal Now Targets Critical Infrastructure Worldwide
SocialApr 7, 2026

Iran's Cyber Arsenal Now Targets Critical Infrastructure Worldwide

Iran has rapidly developed advanced cyber capabilities, evolving from information gathering to conducting destructive, state-linked attacks against critical infrastructure in the U.S., Israel, and the Gulf states. https://t.co/XlKdD8VuZu

By Teri Radichel
New Threat Evolves Script Kiddies, Targets Everyday Users
SocialApr 7, 2026

New Threat Evolves Script Kiddies, Targets Everyday Users

read this when it first came out.. my first thought was crystal clear: "This is simply the natural evolution of SCRIPT KIDDIES but on steroids.." my second thought was broader: "The majority of every day people, will indeed at some point very soon, fall...

By Dez Blanchfield
New Cyber Threats Target Power Grid Infrastructure
SocialApr 7, 2026

New Cyber Threats Target Power Grid Infrastructure

All emerging cyber threats targeting power infrastructure at a glance #energysky -- via pv magazine usa: https://t.co/CgfOPDFHMV

By Tor “SolarFred” Valenza