Know What's Happening in Cybersecurity

Today's Cybersecurity Pulse

Anthropic CEO meets White House over federal access to Mythos AI

Anthropic CEO Dario Amodei will meet White House chief of staff Susie Wiles to discuss government access to the company's Mythos AI model, which can discover and exploit zero‑day vulnerabilities. The meeting follows a Pentagon‑imposed blacklist after Amodei refused to lift safety restrictions, while Treasury, intelligence agencies and CISA are already testing the model.

New Progress ShareFile Flaws Can Be Chained in Pre-Auth RCE Attacks
NewsApr 2, 2026

New Progress ShareFile Flaws Can Be Chained in Pre-Auth RCE Attacks

Researchers at watchTowr identified two critical flaws—CVE‑2026‑2699 and CVE‑2026‑2701—in Progress ShareFile’s Storage Zones Controller (SZC). The authentication bypass (CVE‑2026‑2699) lets attackers reach the admin interface, while the remote code execution bug (CVE‑2026‑2701) enables malicious ASPX webshell deployment. Chaining the vulnerabilities...

By BleepingComputer
Storm Infostealer Sold as Service, Targets Browsers, Wallets and Accounts
NewsApr 2, 2026

Storm Infostealer Sold as Service, Targets Browsers, Wallets and Accounts

Storm, a new infostealer discovered by Varonis Threat Labs in early 2026, can decrypt Chrome’s App‑Bound Encryption and harvest credentials, session cookies, crypto wallets, and messaging app accounts from Chrome, Edge, Firefox and other browsers. The malware is offered as...

By HackRead
Study Finds 1,748 Exposed API Keys on 10,000 Webpages, Raising SaaS Security Alarm
NewsApr 2, 2026

Study Finds 1,748 Exposed API Keys on 10,000 Webpages, Raising SaaS Security Alarm

Security researchers analyzing 10 million webpages identified 1,748 valid API keys on nearly 10,000 sites, many belonging to cloud, payment and developer‑tool services. The leak, largely hidden in client‑side JavaScript, underscores a systemic weakness in SaaS credential management.

By Pulse
Niobium Brings Fully Encrypted AI Workloads to the Cloud with The Fog
NewsApr 2, 2026

Niobium Brings Fully Encrypted AI Workloads to the Cloud with The Fog

Niobium Microsystems is set to launch The Fog, a cloud platform that runs AI and data‑processing workloads on fully homomorphic encryption (FHE) without ever decrypting the data. The service relies on the company’s new mistic Core processor, an FPGA‑based chip...

By SiliconANGLE
GitHub Used as Covert Channel in Multi-Stage Malware Campaign
NewsApr 2, 2026

GitHub Used as Covert Channel in Multi-Stage Malware Campaign

A new multi‑stage malware campaign targeting South Korean users leverages malicious LNK shortcut files that pull PowerShell commands from GitHub repositories. The attackers embed decoding functions directly in the LNK arguments, use decoy PDF documents to mask activity, and establish...

By Infosecurity Magazine
F5 and Forcepoint Partner to Address AI Data Risk and Runtime Security
NewsApr 2, 2026

F5 and Forcepoint Partner to Address AI Data Risk and Runtime Security

F5 and Forcepoint announced a partnership that bundles F5’s runtime AI protections with Forcepoint’s Data Security Posture Management (DSPM) for enterprise customers. The joint go‑to‑market approach uses channel partners rather than deep product integration, allowing MSPs, VARs and SIs to...

By ChannelE2E
How North Korean Operatives Get Hired, and How HR Can Stop Them
NewsApr 2, 2026

How North Korean Operatives Get Hired, and How HR Can Stop Them

The U.S. Treasury last month sanctioned six individuals and two entities for operating North Korean IT‑worker fraud networks that generated nearly $800 million in 2024. A joint report by threat‑intelligence firm Flare and IBM X‑Force detailed how these operatives infiltrate American firms...

By HRTechFeed
How North Korean Operatives Get Hired, and How HR Can Stop Them
NewsApr 2, 2026

How North Korean Operatives Get Hired, and How HR Can Stop Them

The U.S. Treasury sanctioned six individuals and two entities linked to North Korean IT worker fraud networks that generated nearly $800 million in 2024. Threat‑intelligence firms Flare and IBM X‑Force detailed how operatives infiltrate U.S. firms using fabricated LinkedIn profiles, tailored...

By Human Resource Executive
Boards Are Falling Short on Cybersecurity
NewsApr 2, 2026

Boards Are Falling Short on Cybersecurity

Boards increasingly recognize the need for cybersecurity investments, yet their oversight is lagging. A 2024 FBI report shows cybercrime losses jumped 33% year‑over‑year, underscoring the growing threat. The authors identify three core weaknesses: insufficient expertise on boards, superficial risk conversations,...

By Harvard Business Review
Verifying AI Agent Intent Becomes Security Priority
SocialApr 2, 2026

Verifying AI Agent Intent Becomes Security Priority

Proofpoint is betting big on Intent in the age of AI agents. At RSA Conference 2026, Proofpoint launched Proofpoint AI Security powered by its recent acquisition of Acuvity. The core idea is simple but powerful. Traditional security tools check permissions - Does...

By Shashi Bellamkonda
Hackers Shift Focus From Code to Human Exploits
SocialApr 2, 2026

Hackers Shift Focus From Code to Human Exploits

🚨 JUST IN Solana Foundation president Lily Liu states that hackers are now targeting humans instead of code vulnerabilities. 👀 https://t.co/Wjh2kJ7dTT

By That Martini Guy
Former Employee of National Industrial Company Pleads Guilty to Crimes Related to Hacking Computer Networks and Extorting Employees
NewsApr 2, 2026

Former Employee of National Industrial Company Pleads Guilty to Crimes Related to Hacking Computer Networks and Extorting Employees

A former core infrastructure engineer at a New Jersey‑based industrial firm pleaded guilty in federal court to extorting the company and damaging its computer network. In November 2023, the 59‑year‑old Missouri resident initiated unauthorized remote‑desktop sessions, deleted admin accounts, altered passwords,...

By US DOJ Antitrust Division – Press Releases
Pipelines Pose Greater Security Risks Than Ships
SocialApr 2, 2026

Pipelines Pose Greater Security Risks Than Ships

Problem is pipelines are much harder to defend, easier to rupture and cyberattack than ships unless you bury everything far underground which is exceedingly difficult.

By John Konrad
Could Native Solana Multi‑Sig Have Stopped the Drift Hack?
SocialApr 2, 2026

Could Native Solana Multi‑Sig Have Stopped the Drift Hack?

If Solana had native multi sig addresses, would the Drift hack even have been possible? Actually curious, not trolling.

By Arthur Hayes
Critical Cisco IMC Auth Bypass Gives Attackers Admin Access
NewsApr 2, 2026

Critical Cisco IMC Auth Bypass Gives Attackers Admin Access

Cisco disclosed a critical authentication bypass (CVE‑2026‑20093) in its Integrated Management Controller (IMC) that lets unauthenticated attackers obtain admin privileges on UCS C‑Series and E‑Series servers. The flaw resides in the password‑change function and can be triggered with a crafted...

By BleepingComputer
Anthropic's Code Leak Raises Doubts About Enterprise Security
SocialApr 2, 2026

Anthropic's Code Leak Raises Doubts About Enterprise Security

If Anthropic just leaked their own code (and one of the most valuable pieces of IP on the planet right now)... what makes you think their 'enterprise grade security features' are enough to protect your ideas and data?

By The Secret CFO
Cyber-Physical Security Gaps Demand Attention, Health-ISAC’s 2025 Exercise Series Finds
NewsApr 2, 2026

Cyber-Physical Security Gaps Demand Attention, Health-ISAC’s 2025 Exercise Series Finds

Health‑ISAC’s 2025 resilience exercise series revealed persistent gaps in coordinating cyber and physical security teams across seven simulated ransomware‑plus‑intrusion tabletop drills. Participants repeatedly reported fragmented communication, delayed escalation, and insufficient joint response procedures. The after‑action report distilled twelve priority observations,...

By healthsystemCIO
Google GAs New Ransomeware Protections for Drive, 14x Improvement From Beta
NewsApr 2, 2026

Google GAs New Ransomeware Protections for Drive, 14x Improvement From Beta

Google announced a new ransomware protection suite for Google Drive that leverages advanced AI to scan and block malicious files before they reach users. The service delivers a 14‑times improvement in detection rates compared with the previous beta program, while...

By The Stack (TheStack.technology)
Why GitHub Developers Are Targeted by Token Giveaway Scams
NewsApr 2, 2026

Why GitHub Developers Are Targeted by Token Giveaway Scams

GitHub developers are increasingly targeted by sophisticated token giveaway scams that masquerade as legitimate project announcements. Attackers exploit developers' public activity, mimicking maintainers, using authentic branding, and leveraging technical language to appear credible. The scams rely on urgency, hidden malicious...

By HackRead
A Quantum Apocalypse Is Coming for the Internet
BlogApr 2, 2026

A Quantum Apocalypse Is Coming for the Internet

Google’s quantum research team released a white paper showing it can break 256‑bit elliptic‑curve cryptography using roughly 20 times fewer physical qubits than previously estimated. The breakthrough threatens the cryptographic foundations of most blockchains and many internet security protocols. The article...

By The Quantum Foundry
US Intelligence Elevates Quantum to AI Threat Level
SocialApr 2, 2026

US Intelligence Elevates Quantum to AI Threat Level

The U.S. Intelligence Community Just Put Quantum on Equal Footing with AI. And Expanded the Threat Definition https://t.co/BFmWJ9pOmy via @infosec

By Chuck Brooks
How ‘Wikipedia of Cyber’ Helps SAP Make Sense of Threat Data
NewsApr 2, 2026

How ‘Wikipedia of Cyber’ Helps SAP Make Sense of Threat Data

SAP, the world’s largest enterprise‑software provider, is tackling the massive scale of its security telemetry—over 150 TB per month—by partnering with Boston‑based Uptycs. The collaboration introduces Juno AI, an analyst platform that blends artificial intelligence with human expertise to deliver real‑time,...

By ComputerWeekly – DevOps
Possible US Government iPhone Hacking Tool Leaked
BlogApr 2, 2026

Possible US Government iPhone Hacking Tool Leaked

Google researchers disclosed a sophisticated iPhone exploit kit called Coruna, which chains 23 iOS vulnerabilities to silently install malware via compromised websites. Evidence points to the toolkit’s origins in the U.S., specifically the Trenchant division of defense contractor L3Harris. Former...

By Schneier on Security
Marquis Fintech Breach Exposes Data of 672,075 Customers in Ransomware Attack
NewsApr 2, 2026

Marquis Fintech Breach Exposes Data of 672,075 Customers in Ransomware Attack

Marquis Marketing Services, a data‑analytics firm used by hundreds of banks, confirmed a ransomware attack that exposed the personal and financial information of 672,075 individuals. The breach, traced to a flaw in firewall provider SonicWall’s cloud backup, has triggered a...

By Pulse
DeFi Platform Drift Freezes Deposits After Hack that May Have Stolen up to $285 Million
NewsApr 2, 2026

DeFi Platform Drift Freezes Deposits After Hack that May Have Stolen up to $285 Million

Solana‑based DeFi platform Drift announced it is suspending all deposits and withdrawals after confirming an active attack that may have stolen between $136 million and $285 million. The breach sent the DRIFT token down more than 20% and added fresh pressure to...

By Pulse
ISC2 Brings AI Security Into the Heart of Cybersecurity Certifications
NewsApr 2, 2026

ISC2 Brings AI Security Into the Heart of Cybersecurity Certifications

The International Information System Security Certification Consortium (ISC2) unveiled new exam guidance that weaves artificial‑intelligence security concepts throughout its entire certification suite. The guidance maps AI topics across more than 50 core exam domains, concluding a three‑year refresh that involved...

By SiliconANGLE
Enterprises Are All in on AI for Security but Budgets Aren’t Keeping Pace
NewsApr 2, 2026

Enterprises Are All in on AI for Security but Budgets Aren’t Keeping Pace

Enterprises recognize AI as a cornerstone of modern cybersecurity, with 96% of surveyed security leaders already deploying AI solutions. Yet 85% feel their budgets lag behind the escalating AI‑driven threat landscape, and only 20% claim robust governance frameworks. EY’s survey...

By TechMonitor
Axios Hack Exposes AI-Coding’s Dependency Problem
BlogApr 2, 2026

Axios Hack Exposes AI-Coding’s Dependency Problem

Hackers breached the npm account for the widely used JavaScript library Axios, injecting malicious code that was downloaded millions of times before being pulled. The incident follows a similar supply‑chain attack on the LiteLLM PyPI package, highlighting how AI‑coding tools...

By LeadDev (independent publication)
SED News: OpenCode, AI Code Vs. Shipped Code, and the LiteLLM Breach
PodcastApr 2, 202656 min

SED News: OpenCode, AI Code Vs. Shipped Code, and the LiteLLM Breach

In this episode of SED News, hosts Gregor and Sean discuss the resurgence of ARM CPUs as they move into branding their own chips, driven by the growing demand for local AI agent workloads that favor CPU and memory over...

By Software Engineering Daily – Data
Rely on Contracts and Legitimate Interest, Not Consent
SocialApr 2, 2026

Rely on Contracts and Legitimate Interest, Not Consent

Most compliance frameworks lean on consent as the primary lawful basis. Consent can be withdrawn at any time. Thailand's PDPA proves it: that's structural vulnerability, not safe harbor. Map your processing to contract performance + legitimate interest first. https://t.co/PTQjD2GryX

By Yves Mulkers
FBI Warns of AVrecon Malware Targeting Network Devices Across 163 Countries
NewsApr 2, 2026

FBI Warns of AVrecon Malware Targeting Network Devices Across 163 Countries

The FBI has issued a warning about AVrecon, a modular malware that compromises home and small‑office routers by exploiting unpatched remote‑code‑execution flaws. The malware was used by the now‑dismantled SocksEscort proxy service, which sold access to roughly 369,000 infected devices...

By The Cyber Express
Most CNI Firms Face Up to £5m in Downtime From OT Attacks
NewsApr 2, 2026

Most CNI Firms Face Up to £5m in Downtime From OT Attacks

A recent e2e‑assure survey of 250 UK critical national infrastructure (CNI) decision‑makers found that 80% of providers could incur OT downtime costs ranging from £100,000 ($132,144) to £5 million ($6.6 million) after a cyber‑attack. Roughly one‑quarter of incidents exceed $1.3 million, and 6%...

By Infosecurity Magazine
Intesa Sanpaolo Missed Unauthorized Access for 2 Years, Regulator Reveals
NewsApr 2, 2026

Intesa Sanpaolo Missed Unauthorized Access for 2 Years, Regulator Reveals

Italy’s data protection authority disclosed that Intesa Sanpaolo failed to detect an insider’s unauthorized access for over two years. A single employee viewed the records of more than 3,500 customers, leading to a €31.8 million (≈ $34.7 million) fine. Regulators said the bank’s...

By The Cyber Express
Microsoft’s VibeVoice Is Free, Open-Source, and a Compliance Problem Waiting to Happen
NewsApr 2, 2026

Microsoft’s VibeVoice Is Free, Open-Source, and a Compliance Problem Waiting to Happen

Microsoft Research has open‑sourced VibeVoice, a free, locally‑run voice AI that can generate up to 90 minutes of multi‑speaker conversational audio and transcribe 60‑minute recordings with speaker attribution. The system runs on consumer‑grade hardware with roughly 200 ms first‑chunk latency, but was...

By AffiliateINSIDER
Developing A Security Framework For Chiplet-Based Systems
NewsApr 2, 2026

Developing A Security Framework For Chiplet-Based Systems

The article outlines a security framework for chiplet‑based systems, emphasizing that each chiplet must possess a verifiable identity tied to a platform‑wide trust chain. It describes two provisioning patterns—certificate‑based external provisioning and silicon‑derived (PUF) self‑generated keys—and explains how both feed...

By Semiconductor Engineering
World First: MACsec IP Receives ISO/PAS 8800 Certification For Automotive And Physical AI Security
NewsApr 2, 2026

World First: MACsec IP Receives ISO/PAS 8800 Certification For Automotive And Physical AI Security

Synopsys became the first company to earn ISO/PAS 8800 certification for its MACsec IP, a standard that secures Ethernet communication inside vehicles. The certification, validated by SGS TÜV Saar, confirms that the IP not only protects data integrity but also meets the...

By Semiconductor Engineering
NCSC Warns of Messaging App Targeting Public Sector
NewsApr 2, 2026

NCSC Warns of Messaging App Targeting Public Sector

The UK National Cyber Security Centre (NCSC) has warned that Russian‑based threat actors are targeting public‑sector personnel through popular messaging apps such as WhatsApp, Messenger and Signal. High‑risk individuals—those with access to or influence over sensitive information—may face login‑code theft,...

By UKAuthority (UK)
Authentication Isn’t Enough: Users Still Fall for Scams
SocialApr 2, 2026

Authentication Isn’t Enough: Users Still Fall for Scams

Your customer passed authentication. So why are they sending money to a scammer? https://t.co/Hj99rzCfca https://t.co/wVaFWQnnEq

By Eric Vanderburg
Massive AI Training Data Leak Threatens U.S. Security
SocialApr 2, 2026

Massive AI Training Data Leak Threatens U.S. Security

Wow. Incredible amount of SOTA training data now just available to China thanks to @mercor_ai leak. Every major lab. Billions and billions of value and a major national security issue.

By Garry Tan
Libinput Hit By Worrying Security Issues With Its Lua Plug-In System
BlogApr 2, 2026

Libinput Hit By Worrying Security Issues With Its Lua Plug-In System

Libinput added a Lua‑based plug‑in system in version 1.30 to let developers customize device events. Security researchers have now uncovered two critical flaws—CVE‑2026‑35093, a sandbox‑escape that loads unverified bytecode, and CVE‑2026‑35094, a use‑after‑free bug. Both affect the widely deployed input...

By Phoronix
Hashing, Encryption, and Tokenization Explained: How Each One Protects Data Differently
BlogApr 2, 2026

Hashing, Encryption, and Tokenization Explained: How Each One Protects Data Differently

The article breaks down hashing, encryption, and tokenization, explaining how each technique transforms data to protect it. It highlights hashing as a one‑way function ideal for password storage, encryption as a reversible process that secures data in transit, and tokenization...

By System Design Nuggets
Federal Cyber Experts Thought Microsoft’s Cloud Was “A Pile Of Shit.” They Approved It Anyway.
NewsApr 2, 2026

Federal Cyber Experts Thought Microsoft’s Cloud Was “A Pile Of Shit.” They Approved It Anyway.

In late 2024 FedRAMP granted its cybersecurity seal to Microsoft’s Government Community Cloud High (GCC High) even though internal reviewers called the product “a pile of shit” due to missing security documentation. The agency cited a “buyer beware” notice and the...

By Techdirt
Australia Tightens Children’s Online Privacy Rules with New Code
NewsApr 2, 2026

Australia Tightens Children’s Online Privacy Rules with New Code

The Australian government, via the Privacy and Other Legislation Amendment Act 2024, has tasked the OAIC with drafting a Children’s Online Privacy Code. The OAIC released the draft this week, opening it for public comment and targeting the 72 million data...

By Pulse
Russia Cracks Down on VPNs, Fines Users and Apple Delists Apps
NewsApr 2, 2026

Russia Cracks Down on VPNs, Fines Users and Apple Delists Apps

Russia’s digital minister announced measures to slash VPN usage, including potential fees for heavy international traffic and penalties for non‑compliant platforms. At the same time, Apple has removed several custom VPN and proxy apps from its Russian App Store, prompting...

By Pulse
Instagram Removing End-to-End Encryption: A Precision Harvest
BlogApr 2, 2026

Instagram Removing End-to-End Encryption: A Precision Harvest

Meta announced it will terminate end-to-end encryption for Instagram direct messages on May 8, arguing the feature sees low adoption. Despite Instagram’s billions of users, the change sparked virtually no public outcry or organized boycott. Critics say the move reflects...

By LikeCoin
Banks, Telcos to Chuck OTPs, Adopt Silent Authentication
NewsApr 2, 2026

Banks, Telcos to Chuck OTPs, Adopt Silent Authentication

India’s leading private banks and telecom operators are jointly phasing out traditional one‑time passwords in favor of a silent authentication system that validates the mobile number linked to a banking app against the SIM currently active on the device. The...

By ET Telecom (Economic Times)
Anthropic Source‑map Leak Exposes AI Startup Security Gaps
NewsApr 2, 2026

Anthropic Source‑map Leak Exposes AI Startup Security Gaps

Anthropic confirmed a packaging error that exposed a 512,000‑line source‑map for its Claude Code CLI, revealing internal prompts and feature flags. The leak, quickly mirrored across GitHub, underscores growing security concerns for fast‑growing AI firms and their investors.

By Pulse
Google Study Shows Sub‑1,500 Qubit Quantum Attack Could Break Bitcoin, Slashing Prior Estimates
NewsApr 2, 2026

Google Study Shows Sub‑1,500 Qubit Quantum Attack Could Break Bitcoin, Slashing Prior Estimates

Google’s Quantum AI team published a whitepaper revealing that breaking Bitcoin’s cryptography may require only 1,200‑1,450 high‑quality qubits, a dramatic reduction from earlier estimates of millions. The finding accelerates concerns over quantum‑resistant cryptography and could reshape the crypto‑security roadmap.

By Pulse
NordLayer Launches Secure Enterprise Browser for SaaS‑Focused SMBs at $8/User
NewsApr 2, 2026

NordLayer Launches Secure Enterprise Browser for SaaS‑Focused SMBs at $8/User

NordLayer introduced a dedicated enterprise browser built for small‑ and medium‑size businesses that run SaaS workloads. Priced from $8 per user per month, the browser adds zero‑trust routing, DLP, Shadow‑IT monitoring and built‑in SSO/MFA, aiming to replace consumer browsers that...

By Pulse