Today's Cybersecurity Pulse
Microsoft releases record‑size Patch Tuesday for April
The April update cycle delivered 165 patches addressing roughly 340 unique CVEs, including two zero‑day flaws, one of which is already being exploited in the wild. Microsoft urges immediate deployment across all product families.
Also developing:
By the numbers: Artemis raises $70M Series A

Model Resource Exhaustion as a Denial-of-Intelligence Attack
The article introduces “denial‑of‑intelligence” attacks, where adversaries drain AI inference resources instead of bandwidth. By sending crafted prompts that trigger long contexts, deep reasoning, or multiple tool calls, attackers force costly compute cycles on the target. Because AI request costs can vary dramatically, a few malicious inputs can exhaust budgets, degrade performance, and erode user trust. The piece argues that traditional DDoS defenses are insufficient and calls for cost‑aware security controls tailored to AI workloads.
U.S. Government Bans Foreign‑Made Wi‑Fi Routers Over Security Concerns
The U.S. government announced a ban on foreign‑manufactured Wi‑Fi routers, citing national‑security concerns. The move immediately affects retailers and consumers, raising questions about supply‑chain adjustments and future regulatory actions.
IRS Warns Real‑Estate Investors of Ten Tax Scams That Can Slash Returns
The IRS’s 2026 “Dirty Dozen” warning highlights ten tax‑scam tactics that could drain real‑estate investors’ returns. Industry analysts say the scams—ranging from phishing emails to fake tax credits—are especially risky for investors who file complex returns, and they urge stricter...
Surfshark Names COO Dovydas Godelis CEO, Aims to Turn VPN Into Mass‑Adopted Cybersecurity Suite
Surfshark announced that COO Dovydas Godelis will replace founder Vytautas Kaziukonis as chief executive. Godelis, 36, says the company will evolve from a niche VPN provider into a full‑stack cybersecurity solution for everyday users worldwide.
Ripple Deploys AI‑Powered Security for XRP Ledger Amid Growing Crypto Threat Landscape
Ripple announced the integration of artificial‑intelligence‑driven security tools into the XRP Ledger, aiming to boost fraud detection and network resilience. While the company did not reveal technical details, the move reflects a broader push for AI in crypto, echoing trends...
Attribute-Based Access Control for AI Capability Negotiation
The article provides a practical guide for users and developers to disconnect from Apple Single Sign‑On (SSO) and replace it with enterprise‑grade identity solutions. It details the UI steps for consumers, explains why SaaS firms view Apple SSO as a...
Announcing Red Hat Advanced Cluster Security for Kubernetes 4.10
Red Hat released Advanced Cluster Security for Kubernetes version 4.10, extending its security platform across OpenShift clusters in public, private and hybrid clouds. The update adds a technology‑preview plug‑in that surfaces real‑time vulnerability data inside the OpenShift Console, and introduces a...
Strengthening Spain's Digital Sovereignty: Red Hat Enterprise Linux Achieves Top-Tier ENS Security Certification
Red Hat Enterprise Linux (RHEL) 9.0 Extended Update Support has been added to Spain’s CPSTIC catalogue, earning top‑tier certification under the National Security Framework (ENS). The inclusion authorises public‑sector bodies to deploy RHEL while meeting the strict confidentiality, integrity and...

Cyber Security’s Workforce Gap Is a Capability Risk for Government
Australia is pouring billions into cyber security hardware and sovereign capability, yet its workforce remains a critical vulnerability. Women represent only 17% of the nation’s cyber professionals, highlighting a stark diversity gap that hampers problem‑solving under pressure. The Australian Public...

Always-On Assurance: Moving APS Security From “Trust” To Reproducible Evidence
The latest Commonwealth Cyber Security Posture report highlights a decisive move from point‑in‑time audit snapshots to always‑on, automated evidence of control effectiveness. Organizations are urged to replace frantic pre‑audit scrambles with continuous monitoring that delivers reproducible compliance data in real...

Apple’s Age Verification Move Is Bigger than It Looks
Apple has rolled out mandatory age verification for iCloud users in the United Kingdom, shifting the check from individual apps to the account level. The change aligns with the UK’s Online Safety framework, which demands tighter age controls for digital...
Are Your NHIs Fully Supported for Optimal Performance?
Non‑Human Identities (NHIs), or machine identities, are becoming a cornerstone of modern cybersecurity, especially in cloud‑first environments. Organizations must manage the full NHI lifecycle—from discovery and classification to threat detection, remediation, and continuous monitoring—to prevent breaches. Traditional point solutions like...
What Role Does Innovation Play in Agentic AI Development?
Non‑human identities (NHIs), also known as machine identities, are becoming a critical focus for cybersecurity, especially in cloud environments. Managing the full lifecycle of these encrypted secrets and permissions reduces breach risk, improves compliance, and drives operational efficiency. The article...

Councils Push for Federal Shared Security Centre Funding
Australian local councils are lobbying the federal government for shared security operations centres (SOCs) to bolster cyber defences. Ahead of the ALGA national assembly, identical motions call for $10 million AUD (about $6.6 million USD) to fund SOC infrastructure, 24/7 monitoring, SIEM...
ChatGPT Won't Let You Type Until Cloudflare Reads Your React State
Every ChatGPT request now triggers a Cloudflare Turnstile challenge that runs a virtual‑machine program inside the browser. The bytecode arrives encrypted as a 28,000‑character base64 string, but the decryption key – a server‑generated float – is embedded directly in the...

NAB Is Co-Designing a SIEM with Databricks
National Australia Bank (NAB) has joined four other design partners to co‑design Lakewatch, a new security information and event management (SIEM) platform built on Databricks. The solution, currently in private preview, leverages the bank’s existing Databricks‑on‑AWS data lake, Ada, to...
Did You Sign up for the New White House App? Don’t Use It Until You Read This!
The White House launched a mobile app on March 28, 2026, branded “Unparalleled access to the Trump Administration.” Security researcher Thereallo decompiled the APK and uncovered multiple privacy and data‑security violations that breach federal cybersecurity standards. Patrick Quirk highlighted the...
CVE Funding Secured, Yet Deal Details Remain Opaque
CVE funding secured, but the deal details remain a black box. Plus: lookup.disclose.io is live in beta, exploited vulns surged 105%, and the EU CRA clock is ticking. Policy Pulse #8: https://blog.disclose.io/policy-pulse-issue-8-week-of-march-29-2026/
Beyond Heatmaps: Quantify Cyber Risk Financially
Heatmaps aren’t enough anymore for cyber risk. Leaders want to understand financial impact, not just red, yellow, green. https://buff.ly/zGxWwLP

MAESTRO Threat Modeling — NemoClaw
NemoClaw, an open‑source stack for always‑on AI assistants, was examined using the MAESTRO threat‑modeling framework. The static analysis of version 0.1.0 uncovered 23 distinct threats across seven layers, including four critical and seven high‑severity vulnerabilities. While sandbox isolation and network policies...

Over 300 Vietnamese Arrested After Cambodia Scam Bust
More than 300 Vietnamese were arrested in Dong Nai province after being repatriated from Cambodia, where authorities dismantled a transnational online‑scam ring. Cambodia deported 776 Vietnamese nationals linked to the illicit operation, highlighting the scale of Southeast Asia’s cyber‑fraud ecosystem....

Compliance as Code: GENIUS Act Redefines Financial Infrastructure
🔺 Is the "old era" of compliance finally dead? 🪦 In this episode of Fintech Conversations & Insights, Beth Haddock (Stablecoin Standard) explains why the GENIUS Act is forcing a total rethink of financial infrastructure. We dive into: ❌ Why "Honeypot" data collection...
Claude + Codex Automate Comprehensive PRD and Security Reviews
Been doing this for months. Any PRD/Spec/Implementation/Bug + Security hunts includes Claude + Codex, much better thorough analysis and things one or the other misses it'll pick up. My Claude Code instance has hooks + gpt skills for doing...
Is Your Signal Secure?
At the NAB Show, a panel titled “Securing the Signal” examined how broadcasters can shift from reactive security to proactive risk management across distributed field operations. Experts from Fox, Dataminr, Smith Entertainment Group and Verkdata discussed integrating real‑time threat‑intelligence platforms...

Chinese Tech in Canadian Fisheries Raises Spy Concerns
And there is goes… all of Our North American seafood. What could possibly go wrong bringing Chinese technology and equipment into Canada? How much do you want to bet the CCP gives them free fish finding equipment that also sends submarine charts...
Identity Security Advances, Yet Critical Gaps Persist
How Identity Security Has Evolved and Where It Still Falls Short: Token at RSAC 2026 https://t.co/jSbKk2TLry

The Compliance Blind Spot in Cyber Risk
Financial institutions are discovering that compliance can fail even when core systems stay online. Automated compliance judgments degrade silently when underlying data conditions change during cyber incidents, eroding the validity of regulatory outputs. Regulators are shifting focus from mere control...
Apple Adds Extra Security for Older iPhones
Apple is taking an additional step to keep older iPhones protected from the latest exploits. https://t.co/jPJ441uP8A
CareCloud Notifies the SEC After Attack on One of Its EHR Environments
CareCloud disclosed to the SEC that an unauthorized third party accessed one of its six electronic health record (EHR) environments on March 16, causing an eight‑hour disruption that was fully restored the same evening. The company promptly notified its cyber‑insurance carrier,...

The 2026 Cyber Risk Horizon: Why AI Is Changing the Game for European Finance
AI is reshaping cyber risk for European financial institutions, turning generic phishing into highly personalized, multilingual attacks powered by deep‑fakes and synthetic identity documents. Regulators such as the ECB and EBA warn that AI‑driven fraud attempts are surging, while the...
Scaling AI Demands a New Infrastructure Playbook
Enterprises moving AI from pilots to production face a fundamentally different infrastructure challenge, requiring tight integration of accelerated compute, high‑performance networking, security and observability. Fragmented stacks cause fragile deployments and costly GPU idle time, especially during intensive training or retrieval‑augmented...

VRadar Security Achieves Patent-Pending Status for Quantum-Resistant System
Vietnamese engineer Nguyen Xuan Dong has obtained patent‑pending status for VRadar, a cloud‑native Security Operations Center that incorporates NIST‑approved post‑quantum cryptography. Built alone in eight months with AI assistance, the platform processes 1.35 million alerts in 34 days and resolves 91 %...

File Read Flaw in Smart Slider Plugin Impacts 500K WordPress Sites
A file‑read flaw (CVE‑2026‑3098) in the Smart Slider 3 WordPress plugin allows any authenticated user, even a subscriber, to export arbitrary server files. The vulnerability stems from missing capability checks in the plugin’s AJAX export function, enabling access to sensitive files...
ENISA Overhauls Its Cybersecurity Market Analysis Playbook With Version 3.0 of ECSMAF
ENISA unveiled version 3.0 of its Cybersecurity Market Analysis Framework (ECSMAF) in March 2026, adding configurable analytical pathways, recurrent study cycles, and a semi‑automated continuous‑monitoring engine. The new version separates analyses by initiation (planned vs. ad‑hoc) and duration (short 6 months), providing detailed guidance...

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 90
Security Affairs released its Malware Newsletter Round 90, curating roughly 18 recent threat reports spanning nation‑state campaigns, supply‑chain compromises, and novel malware vectors. Highlights include a new Cobra DocGuard infostealer, Iranian actors using Telegram as a command‑and‑control channel, and a supply‑chain attack...

GitHub Outlines Its 2026 Actions Security Roadmap
GitHub unveiled its 2026 security roadmap for GitHub Actions, emphasizing safer defaults, tighter policy controls, and improved observability. The plan targets a broader software‑supply‑chain hardening strategy rather than isolated feature releases. Enterprise users will gain centralized tools to govern workflows,...
Iranian Hackers Use SMS Spyware to Track Civilians Fleeing Missile Strikes
Iranian-linked hackers sent text messages offering bomb‑shelter alerts that instead installed spyware on Android devices of fleeing civilians. The coordinated attack synced with missile strikes, giving attackers camera, location and data access, and is part of a broader wave of...
Compliance Checklists Aren't Enough to Stop Hacks
You filled out the checklist. You're 'compliant.' But I can still hack your systems. Compliance theater doesn't protect you. #DataGovernance #Cybersecurity https://t.co/ycxJfEqCmC
Anonymous Threat Follows Hertz IT Failure Exposé
Posted an article about Hertz's IT failure and received a cryptic, anonymous voicemail warning: "Eric, I saw your article about Hertz. I would be careful if I were you." #TechFailures #Cybersecurity https://t.co/H9ugvwOIjq

Cybersecurity AI Awareness Training for Texas Government Agencies: How Kratikal’s Threatcop Meets the DIR Mandate
Texas’ Department of Information Resources (DIR) has mandated AI‑aware cybersecurity awareness training for all state and local government employees, with a certification deadline of August 31. Kratikal’s Threatcop platform is one of only five vendors approved under the DIR certification, offering...
LeakWatch 2026 – Security Incidents, Data Breaches, and IT Incidents for the Current Calendar Week 13
During calendar week 13 (March 23‑29 2026), LeakWatch recorded a series of breaches that targeted publicly accessible web platforms, outsourced support channels, and software supply‑chain pipelines rather than traditional data‑center assets. High‑profile incidents included a cyber‑attack on the European Commission’s Europa web platform,...
Do Emergency Microsoft, Oracle Patches Point to Wider Issues?
Microsoft and Oracle have each released emergency out‑of‑band patches this week, drawing attention to the fragility of enterprise update cycles. Microsoft’s KB5085516 fixes a sign‑in error that showed a “no internet” message for standard Microsoft accounts after the latest Patch...
Soxton AI Acquires Cipher, Adding Agentic Security to Its AI Legal Platform
Soxton AI completed the acquisition of Cipher, a real‑time security platform for agentic applications, using its own AI‑driven legal tools and cutting legal fees by roughly $80,000. The deal broadens Soxton’s full‑stack offering to include autonomous workflow protection for early‑stage...
VDX.tv’s 90‑Day Cookie Harvest Triggers Privacy Alarm
Exponential Interactive’s VDX.tv is gathering extensive personal and behavioural data through cookies that last up to 90 days, including IP addresses, device identifiers and browsing histories. The practice has ignited privacy‑governance concerns among regulators and consumer‑rights groups, highlighting the tension...
Google Pushes Back Q Day to 2029, Warns of Looming Encryption Risk
Google announced it now expects quantum computers capable of breaking today’s cryptographic algorithms by 2029, accelerating the timeline for industry‑wide security preparations. The company warned that the threat is imminent and called for rapid migration to quantum‑resistant solutions.
Iran-Linked Hackers Breach FBI Director Kash Patel’s Personal Email, Leak Photos and 300+ Messages
Iran-linked Handala Hack Team infiltrated FBI Director Kash Patel’s personal Gmail account and posted a cache of more than 300 emails along with personal photographs. The FBI said the data were historical and contained no classified material, but the breach...
Citrix NetScaler Faces Active Scans Exploiting Critical CVE‑2026‑3055 Flaw
Defended Cyber and watchTowr report that threat actors are actively probing Citrix NetScaler ADC and Gateway for CVE‑2026‑3055, a memory‑overread bug rated 9.3 on the CVSS scale. The vulnerability affects versions before 14.1‑66.59 and 13.1‑62.23, and experts urge immediate patching.
Surfshark Names COO Dovydas Godelis CEO, Aims to Evolve Beyond VPN
Surfshark announced that COO Dovydas Godelis will replace founder Vytautas Kaziukonis as CEO. The 36‑year‑old executive plans to reposition the firm as a comprehensive cybersecurity platform, while keeping its flagship VPN unchanged in the short term.
CISA Adds Critical F5 BIG‑IP AMP RCE Flaw to KEV Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) listed the critical F5 BIG‑IP AMP vulnerability (CVE‑2025‑53521, CVSS 9.8) in its Known Exploited Vulnerabilities (KEV) catalog. Federal agencies must remediate the flaw by March 30, 2026, prompting a worldwide rush to patch vulnerable...
Ripple Deploys AI Tools to Bolster XRP Ledger Security
Ripple announced the integration of AI-driven security tools and an AI‑assisted red team to proactively identify and fix vulnerabilities on the XRP Ledger. The move follows recent upgrades and aims to keep the network resilient as it processes over 100 million...