Know What's Happening in Cybersecurity

Today's Cybersecurity Pulse

Anthropic CEO meets White House over federal access to Mythos AI

Anthropic CEO Dario Amodei will meet White House chief of staff Susie Wiles to discuss government access to the company's Mythos AI model, which can discover and exploit zero‑day vulnerabilities. The meeting follows a Pentagon‑imposed blacklist after Amodei refused to lift safety restrictions, while Treasury, intelligence agencies and CISA are already testing the model.

'Harmless' Global Adware Transforms Into an AV Killer
NewsApr 16, 2026

'Harmless' Global Adware Transforms Into an AV Killer

A threat actor operating as Dragon Boss Solutions LLC pushed a malicious update on March 22, 2025 that transformed its ad‑ware into a potent antivirus‑disabling payload. The update affected roughly 23,500 computers in 124 countries, with half of the victims...

By Dark Reading
The only Way to Fight Deepfakes Is by Making Deepfakes
NewsApr 16, 2026

The only Way to Fight Deepfakes Is by Making Deepfakes

Deep‑fake detection firms such as Reality Defender, Pindrop and GetReal are racing to combat AI‑generated audio, video and image fraud, a market now valued at roughly $5.5 billion. These companies train detection models by creating their own deepfakes, using a student‑teacher...

By The Verge
Apple Pay Express Mode for Transit, When Used With a Visa Card, Is Vulnerable to Scam Tap-to-Pay Readers
BlogApr 16, 2026

Apple Pay Express Mode for Transit, When Used With a Visa Card, Is Vulnerable to Scam Tap-to-Pay Readers

Researchers from the University of Surrey and Birmingham demonstrated that Apple Pay’s Express Transit Mode, when paired with a Visa card, can be hijacked by a specially tuned NFC reader. The attack works on a locked iPhone, intercepts the payment flow,...

By Daring Fireball
An AI View of SentinelOne
BlogApr 16, 2026

An AI View of SentinelOne

McKinsey warns that AI is enabling cybercriminals to launch attacks in minutes rather than days. Attackers leverage AI for hyper‑personalized phishing, deepfakes, instant malicious code, and adaptive tactics. In response, 77% of organizations have integrated AI into security functions, automating...

By Investing in AI
Agentic AI Security Needs Layered, Integrated Defenses
SocialApr 16, 2026

Agentic AI Security Needs Layered, Integrated Defenses

We keep asking how to solve agentic security as if there is a single answer, but most of the conversations I am having suggest it is a combination of least privilege, access controls, monitoring, and good architecture. The question might not...

By Sean D. Mack
Threat Exposure Management Establishes a Risk-Driven Approach for Federal Agencies
NewsApr 16, 2026

Threat Exposure Management Establishes a Risk-Driven Approach for Federal Agencies

Federal agencies are adopting Continuous Threat Exposure Management (CTEM) to shift from traditional vulnerability counting to a risk‑driven security posture. CDW’s leaders describe CTEM as a five‑stage framework—scoping, discovery, prioritization, validation, and mobilization—that ties technical findings to business impact. By...

By FedTech Magazine
North Korea Targets macOS Users in Latest Heist
NewsApr 16, 2026

North Korea Targets macOS Users in Latest Heist

North Korean Lazarus Group offshoot Sapphire Sleet is targeting macOS users with a fake Zoom SDK update delivered via a malicious AppleScript. The campaign begins with LinkedIn recruiter scams aimed at finance professionals, then tricks victims into running the script, which...

By The Register — Networks
Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic
NewsApr 16, 2026

Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic

Researchers at Cisco Talos have uncovered a new botnet, PowMix, actively targeting Czech workers since at least December 2025. The malware is delivered through phishing emails that contain a malicious ZIP file, which drops a Windows shortcut that launches a...

By The Hacker News
If You Want Into Anthropic's Claude Club, You May Have to Show ID
NewsApr 16, 2026

If You Want Into Anthropic's Claude Club, You May Have to Show ID

Anthropic is rolling out identity verification for select Claude features, using Persona Identities as its vendor. The verification prompts may appear at any time to enforce platform integrity, prevent abuse, and meet legal obligations. Anthropic assures users that identity data...

By The Register — Networks
Officials Seize 53 DDoS-for-Hire Domains in Ongoing Crackdown
NewsApr 16, 2026

Officials Seize 53 DDoS-for-Hire Domains in Ongoing Crackdown

Authorities from 21 nations coordinated Operation PowerOFF to dismantle 53 DDoS‑for‑hire domains and seize related servers and databases. The crackdown yielded data on more than 3 million alleged criminal accounts and led to four arrests. Over 75,000 warning emails and letters...

By CyberScoop
CEO Interview: Underdark
NewsApr 16, 2026

CEO Interview: Underdark

Underdark operates in the cyber threat intelligence and dark‑web monitoring market, competing with larger firms such as Recorded Future, Digital Shadows, Flashpoint and Cyberint. While most rivals rely on AI‑assisted crawlers to collect data, Underdark’s core service is human intelligence—direct...

By CB Insights Research
Why Donald Trump and Kash Patel Want Your Data
BlogApr 16, 2026

Why Donald Trump and Kash Patel Want Your Data

Congress is set to vote on a clean reauthorization of FISA Section 702, a foreign‑intelligence tool that also sweeps up the communications of millions of Americans. The Trump administration, with FBI director Kash Patel at the helm, is pushing the bill...

By The Contrarian
Delivering Reliable Connectivity And Cybersecurity On The High Seas: Inside MSP Marlink’s Approach
NewsApr 16, 2026

Delivering Reliable Connectivity And Cybersecurity On The High Seas: Inside MSP Marlink’s Approach

Marlink, a maritime‑focused managed services provider, delivers satellite connectivity and cybersecurity to oceangoing vessels despite tight budgets that often hover around $100‑$200 per month. The company leverages an "exchange platform" that aggregates Inmarsat, OneWeb, Starlink, SES and Iridium links, providing...

By CRN (US)
How Push Notifications Can Betray Your Privacy (and What to Do About It)
BlogApr 16, 2026

How Push Notifications Can Betray Your Privacy (and What to Do About It)

Push notifications travel through Apple or Google servers before reaching a device, exposing message content and metadata to the platform providers. Law‑enforcement can compel these companies to hand over notification data, and forensic tools can recover deleted notifications from a...

By Electronic Frontier Foundation — Deeplinks —
OpenAI Chooses CrowdStrike for Defender‑Focused AI Security
SocialApr 16, 2026

OpenAI Chooses CrowdStrike for Defender‑Focused AI Security

The top AI labs are building for defenders now. Today @OpenAI selected CrowdStrike for their Trusted Access for Cyber program. CrowdStrike continues to lead the market in secure AI adoption, trusted by AI leaders and organizations of all sizes to accelerate...

By George Kurtz
Google Cloud Storage Weaponized for Clandestine Remcos RAT Delivery
NewsApr 16, 2026

Google Cloud Storage Weaponized for Clandestine Remcos RAT Delivery

Threat actors are weaponizing Google Cloud Storage to host phishing pages that silently deliver the Remcos remote‑access trojan. Emails direct victims to fake Google Drive login screens on the legitimate storage.googleapis.com domain, harvesting credentials and deploying a JavaScript loader. The...

By SC Media
Extensive MuddyWater-Like Attack Campaign Against Middle Eastern Critical Infrastructure Detailed
NewsApr 16, 2026

Extensive MuddyWater-Like Attack Campaign Against Middle Eastern Critical Infrastructure Detailed

A threat group mirroring Iran‑backed MuddyWater launched a large‑scale campaign against Middle Eastern critical‑infrastructure entities beginning in February. Exploiting five vulnerabilities—including SmarterMail (CVE‑2025‑52691) and Langflow (CVE‑2025‑34291)—the actors breached more than 12,000 internet‑exposed systems and used brute‑force attacks on Outlook Web...

By SC Media
AISLE’s Open Analyzer — Finding and Fixing Vulnerabilities without Gated Frontier Models
NewsApr 16, 2026

AISLE’s Open Analyzer — Finding and Fixing Vulnerabilities without Gated Frontier Models

AISLE unveiled Open Analyzer, an open‑source vulnerability scanner that leverages small, free LLMs instead of gated frontier models. The tool aims to provide a reliable source of truth by cutting false positives and negatives that plague traditional scanners. AISLE claims...

By SD Times
What to Do When Your AI Guardrails Fail
BlogApr 16, 2026

What to Do When Your AI Guardrails Fail

Microsoft 365 Copilot inadvertently processed confidential emails in users’ Sent Items and Drafts, bypassing sensitivity labels and Data Loss Prevention policies due to a code bug (CW1226324). The incident exposed a fundamental architectural flaw: all AI governance controls reside within...

By IT Security Guru
Bitunix Gains ISO 27001:2022 Certification, Boosting Crypto Exchange Security
NewsApr 16, 2026

Bitunix Gains ISO 27001:2022 Certification, Boosting Crypto Exchange Security

Bitunix, a crypto derivatives platform with over 5 million users, secured ISO/IEC 27001:2022 certification, confirming its formal information‑security management system. The move adds a globally recognized seal of trust to its proof‑of‑reserves model and $30 million USDC care fund, signaling heightened compliance for...

By Pulse
Brockton Hospital Restores Full Services After Week-Long Cyberattack
NewsApr 16, 2026

Brockton Hospital Restores Full Services After Week-Long Cyberattack

Signature Healthcare's Brockton hospital announced the restoration of all services following a cyberattack that halted pharmacy fills, chemotherapy, and patient portal access. The recovery, driven by intensive IT and clinical effort, underscores growing cybersecurity risks in the health sector.

By Pulse
Cal.com Closes Core Codebase Over AI Security Fears, Launches MIT‑Licensed Cal.diy
NewsApr 16, 2026

Cal.com Closes Core Codebase Over AI Security Fears, Launches MIT‑Licensed Cal.diy

Cal.com announced it is moving its production codebase behind closed doors, warning that AI tools like Anthropic’s Claude Mythos make open code a security liability. The company, which has raised more than $30 million, simultaneously unveiled Cal.diy, an MIT‑licensed, feature‑lite variant...

By Pulse
CISA Flags Windows Task Host Flaw as Actively Exploited, Urges Federal Patch
NewsApr 16, 2026

CISA Flags Windows Task Host Flaw as Actively Exploited, Urges Federal Patch

The Cybersecurity and Infrastructure Security Agency (CISA) placed the Windows Task Host privilege‑escalation bug (CVE‑2025‑60710) on its catalog of actively exploited vulnerabilities and ordered federal agencies to apply the November 2025 Microsoft patch within two weeks. The move highlights a...

By Pulse
Q&A: Your Face Is Now Part of the Threat Landscape, Warns Sarah Armstrong-Smith
BlogApr 16, 2026

Q&A: Your Face Is Now Part of the Threat Landscape, Warns Sarah Armstrong-Smith

Sarah Armstrong‑Smith, former Microsoft EMEA security chief, warns that image‑based AI has turned faces, voices and online presence into a new attack surface. The technology enables cheap deepfakes and impersonation, exposing individuals and firms to reputational, emotional and financial harm....

By IT Security Guru
Cinia Taps Nokia for DDoS Protection of Critical Infrastructure
NewsApr 16, 2026

Cinia Taps Nokia for DDoS Protection of Critical Infrastructure

Cinia announced a new managed security service that leverages Nokia’s Deepfield Defender to provide 24/7 DDoS protection for its critical infrastructure networks. The AI‑based solution embeds detection and mitigation directly into the transport layer, giving Finnish customers real‑time threat awareness....

By Telecoms.com
APK Malformation Found in Thousands of Android Malware Samples
NewsApr 16, 2026

APK Malformation Found in Thousands of Android Malware Samples

Researchers at Cleafy have identified a surge in Android Package (APK) malformation, an evasion technique now present in more than 3,000 malware samples across families such as Teabot, TrickMo, Godfather and SpyNote. By deliberately corrupting APK structures—creating mismatched headers, unsupported...

By Infosecurity Magazine
Two-Factor Authentication Breaks Free From the Desktop
NewsApr 16, 2026

Two-Factor Authentication Breaks Free From the Desktop

Two-factor authentication (2FA) is expanding beyond traditional IT logins to protect physical assets such as cars, home heating systems, and medical devices. In the automotive sector, firms like Keyfree Technologies are pairing in‑vehicle hardware with mobile apps to require one‑time...

By Dark Reading
As DPDPA Kicks In, Are Startups Ready For Privacy Compliance Burden?
NewsApr 16, 2026

As DPDPA Kicks In, Are Startups Ready For Privacy Compliance Burden?

India’s Digital Personal Data Protection Act (DPDPA) 2023 and the DPDP Rules 2025 set an 18‑month compliance timeline ending May 2027, creating a $1.2 bn compliance‑as‑a‑service market. Startup IDfy, backed by Blume Ventures and others, won a government‑run privacy‑platform competition and is...

By Inc42
Cyber Incidents’ “Long Tail” Impact on Shareholder Value
BlogApr 16, 2026

Cyber Incidents’ “Long Tail” Impact on Shareholder Value

A new ISS STOXX and ISS‑Corporate study of 176 cyber events in Russell 3000 firms shows that companies hit by significant breaches underperform the market by roughly 5% over a three‑year horizon. The underperformance persists for more than a year, indicating a...

By The D&O Diary
Microsoft's Original Windows Secure Boot Certificate Is Expiring
NewsApr 16, 2026

Microsoft's Original Windows Secure Boot Certificate Is Expiring

Microsoft announced that the original UEFI Secure Boot certificates, first deployed in 2011, will expire on June 24, 2024. The company is urging IT leaders to apply the updated 2023 certificates to all Windows PCs built before 2024 to maintain the hardware‑based...

By Dark Reading
Mythos Poses Risk to SEC Market-Tracking Database, Group Says
NewsApr 16, 2026

Mythos Poses Risk to SEC Market-Tracking Database, Group Says

Anthropic’s new AI model Mythos could exploit the SEC’s Consolidated Audit Trail (CAT), a database that tracks every trade in U.S. equities. The American Securities Association warned that the model enables mass identity theft, portfolio exposure, and insider‑threat amplification, and...

By Accounting Today
Your Employees Are Already Vibe Coding. Now What?
BlogApr 16, 2026

Your Employees Are Already Vibe Coding. Now What?

The article warns that employees are already using AI‑driven “vibe coding” to create live applications without IT or security oversight. These shadow apps can expose sensitive data because the AI builds exactly what is asked, ignoring access controls, encryption, and...

By The Human Stack
AI Is a Gold Mine for Spammers and Scammers, but Google Is Using It as a Tool to Fight Back
NewsApr 16, 2026

AI Is a Gold Mine for Spammers and Scammers, but Google Is Using It as a Tool to Fight Back

Google’s latest ads safety report reveals that generative AI, specifically its Gemini system, intercepted over 99% of policy‑violating ads in 2024, blocking more than 8.3 billion ads—including 602 million scam‑related pieces. The AI‑driven approach also cut incorrect advertiser suspensions by 80% and...

By Mint – Technology (India)
Cookeville Medical Center Notifies Patients After July 2025 Ransomware Attack
NewsApr 16, 2026

Cookeville Medical Center Notifies Patients After July 2025 Ransomware Attack

Cookeville Regional Medical Center disclosed that a July 2025 ransomware attack exposed the personal and medical records of 337,917 patients. The Russian‑linked Rhysida gang claimed responsibility, demanding 10 Bitcoin—about $1.15 million—though it is unclear if the ransom was paid. The hospital began mailing...

By Infosecurity Magazine
What Are Security Experts Saying About OpenAI’s GPT-5.4-Cyber?
NewsApr 16, 2026

What Are Security Experts Saying About OpenAI’s GPT-5.4-Cyber?

OpenAI has launched GPT‑5.4‑Cyber, a defensive‑oriented AI model, and is scaling its Trusted Access for Cyber (TAC) program to thousands of verified individual defenders and hundreds of critical‑infrastructure groups. Unlike Anthropic’s Claude Mythos, which remains limited to a handful of...

By Security Magazine (Cybersecurity)
OpenAI Launches GPT-5.4-Cyber to Boost Defensive Cybersecurity
NewsApr 16, 2026

OpenAI Launches GPT-5.4-Cyber to Boost Defensive Cybersecurity

OpenAI unveiled GPT-5.4-Cyber, a defensive‑focused variant of its flagship GPT‑5.4 model, featuring binary reverse‑engineering to analyze compiled code without source access. The launch coincides with the expansion of its Trusted Access for Cyber (TAC) program, now available to thousands of...

By HackRead
Post-Quantum Cryptography Migration at Meta: Framework, Lessons, and Takeaways
NewsApr 16, 2026

Post-Quantum Cryptography Migration at Meta: Framework, Lessons, and Takeaways

Meta released a detailed guide on its post‑quantum cryptography (PQC) migration, outlining a multi‑year rollout of PQ‑enabled TLS across its internal infrastructure. The company introduced a five‑tier PQC Migration Level framework—PQ‑Unaware to PQ‑Enabled—to help organizations assess and prioritize quantum‑risk mitigation....

By Meta Engineering
Intercede Now Supports Idemia PS Devices for Unified FIDO, PKI Credential Management
NewsApr 16, 2026

Intercede Now Supports Idemia PS Devices for Unified FIDO, PKI Credential Management

Intercede has integrated Idemia Public Security’s newest authentication hardware into its MyID CMS 12.18 platform, enabling unified management of both FIDO and PKI credentials. The Idemia devices, built on the COSMO X platform, meet the FIPS 201 PIV standard required for...

By Biometric Update
Quest Software Launches the Quest Security Management Platform
NewsApr 16, 2026

Quest Software Launches the Quest Security Management Platform

Quest Software unveiled the Quest Security Management Platform, an AI‑powered suite that consolidates identity threat detection, response, and recovery into a single solution. The platform introduces Quest Identity Defense to block unauthorized changes to Tier 0 assets and Quest Identity Recovery...

By Database Trends & Applications (DBTA)
Brain Corp Achieves SOC 2 Compliance, Reinforcing Trusted Enterprise-Grade Deployment of AI Systems at Scale
NewsApr 16, 2026

Brain Corp Achieves SOC 2 Compliance, Reinforcing Trusted Enterprise-Grade Deployment of AI Systems at Scale

Brain Corp announced that its BrainOS platform has passed a SOC 2 Type II audit, confirming robust data security and operational controls. The company now supports more than 40,000 autonomous mobile robots deployed across six continents in settings such as stores, warehouses...

By RoboticsTomorrow
N-Able CEO On The MSP AI Journey: Efficiency First, Safe Deployment Next, Monetization Last
NewsApr 16, 2026

N-Able CEO On The MSP AI Journey: Efficiency First, Safe Deployment Next, Monetization Last

N‑able CEO John Pagliuca told CRN that managed‑service providers must prioritize efficiency, then safe AI deployment, and only later monetize AI. At the Empower conference the company unveiled a Model Context Protocol (MCP) server that securely connects external LLMs like...

By CRN (US)
SMBs Know Basics; Prioritize What Truly Matters
SocialApr 16, 2026

SMBs Know Basics; Prioritize What Truly Matters

For SMBs, cybersecurity is rarely a knowledge problem. Most teams know the basics. The challenge is figuring out what actually matters for their business and doing that well.

By Sean D. Mack
Simple Closure Launches Asset Hub to Sell Legacy Data
SocialApr 16, 2026

Simple Closure Launches Asset Hub to Sell Legacy Data

a company called @simple_closure that helps startups wind down is launching "asset hub", which is a marketplace to sell all the old slack/email data apparently they are working on hardening the PII removal tech for this

By Yohei Nakajima
New AI TUIs May Expand Attack Surface via React
SocialApr 16, 2026

New AI TUIs May Expand Attack Surface via React

I know there are some new TUIs coming out for AI development but I’m concerned about increasing the attack surface with web technologies like react. Securing AI is hard enough as it is.

By Teri Radichel
World Cup Partners Neglect Strong DMARC Domain Protection
SocialApr 16, 2026

World Cup Partners Neglect Strong DMARC Domain Protection

Some World Cup partners are not actively protecting their domain name with the strongest DMARC policy. https://t.co/Q4k3WpQ9hb

By TechRadar
Russia Caps Bandwidth, Forcing VPN Filters or Price Hikes
SocialApr 16, 2026

Russia Caps Bandwidth, Forcing VPN Filters or Price Hikes

Russia’s fight against digital privacy escalates as internet providers agree to freeze the expansion of cross-border channels into Europe. By capping international bandwidth, authorities aim to force telecom operators to either filter VPN traffic or hike prices, making it harder...

By TechRadar
Mid‑Market Firms Must Close Compliance Gaps Now
SocialApr 16, 2026

Mid‑Market Firms Must Close Compliance Gaps Now

Mid-market regulated firms are sitting on a compliance gap. PHI/PII pipelines built for speed, not governance. DLT expectations. Unity Catalog policies. On-call ownership. Most have one layer. Few have all five. Build it right once. Outrun the audit.

By Yves Mulkers
Small Businesses Need Post‑quantum Encryption Now
SocialApr 16, 2026

Small Businesses Need Post‑quantum Encryption Now

Even if you’re a small business, your data has long-term value. Cybercriminals are hoarding encrypted data, betting quantum computers will crack it. Post-quantum cryptography (PQC) and PQC-ready vendors are the defense today. https://t.co/JCn5eZDeii

By Cristina Dolan
AI Revives Early‑2000s 0‑Day Chaos
SocialApr 16, 2026

AI Revives Early‑2000s 0‑Day Chaos

Has AI brought back the early 2000s? People can find and exploit 0days easily. Hackers angry at Microsoft are dropping 0day. Frosted tips are cool again (ok, that one would mean the apocalypse)

By The Grugq