Know What's Happening in Cybersecurity

Today's Cybersecurity Pulse

Microsoft releases record‑size Patch Tuesday for April

The April update cycle delivered 165 patches addressing roughly 340 unique CVEs, including two zero‑day flaws, one of which is already being exploited in the wild. Microsoft urges immediate deployment across all product families.

Thousands of Corewell Health Patients Affected by Security Breach
NewsMar 28, 2026

Thousands of Corewell Health Patients Affected by Security Breach

Corewell Health disclosed that its former consulting partner, Pinnacle Holdings, suffered a data breach in 2024, potentially compromising the personal information of thousands of patients. The health system promptly initiated an internal review to determine the scope of exposure and...

By DataBreaches.net
IRS Issues Dirty Dozen Alert as AI-Powered Tax Refund Scams Surge
NewsMar 28, 2026

IRS Issues Dirty Dozen Alert as AI-Powered Tax Refund Scams Surge

The Internal Revenue Service released its 2026 "Dirty Dozen" list, flagging 12 tax‑refund scams—including AI‑generated robocalls and sophisticated phishing—targeting millions of filers. The agency logged over 600 social‑media impersonators in FY 2025 and warned that the scams are more aggressive...

By Pulse
Supply‑Chain Breach of Aqua Security's Trivy Hits Millions of Developers
NewsMar 28, 2026

Supply‑Chain Breach of Aqua Security's Trivy Hits Millions of Developers

Aqua Security confirmed that its open‑source Trivy vulnerability scanner was hijacked on March 19, 2026 by the hacker group TeamPCP. The attackers injected malicious binaries and GitHub‑Actions tags, stealing 300 GB of credentials and affecting millions of developers who rely on the tool.

By Pulse
GitHub to Train Copilot Models on User Data, Sharing Results with Microsoft
NewsMar 28, 2026

GitHub to Train Copilot Models on User Data, Sharing Results with Microsoft

GitHub announced that, beginning April 24, it will collect usage data from free, Pro and Pro+ Copilot users to train its own AI models and share the data with Microsoft. Business, Enterprise and users who opt out are exempt, sparking...

By Pulse
Secure Authentication Starts With Secure Software Development
NewsMar 28, 2026

Secure Authentication Starts With Secure Software Development

The MojoAuth blog stresses that secure authentication begins with secure software development, not just choosing the right protocol. It highlights how modern methods like passkeys, WebAuthn, OAuth, and JWT introduce implementation challenges that can become breach vectors. The article outlines...

By Security Boulevard
What Is Shift Left Security?
NewsMar 28, 2026

What Is Shift Left Security?

Shift‑Left Security embeds protection into the earliest phases of the software development lifecycle, moving security checks leftward on the SDLC diagram. Gartner forecasts cloud spending will exceed $1 trillion by 2028, intensifying the need for proactive AppSec. By integrating automated SAST,...

By Security Boulevard
Open VSX Scanner Vulnerability Lets Malicious Extensions Go Live
NewsMar 28, 2026

Open VSX Scanner Vulnerability Lets Malicious Extensions Go Live

Open VSX, the extension marketplace for VS Code forks, patched a critical “Open Sesame” vulnerability that let malicious extensions bypass its pre‑publish scanning pipeline. The flaw stemmed from a Boolean logic error that treated scanner failures as a “no scanners configured”...

By GBHackers On Security
China Used Fake LinkedIn Profiles to Spy on NATO, EU: Security Source
NewsMar 28, 2026

China Used Fake LinkedIn Profiles to Spy on NATO, EU: Security Source

Chinese state security operatives deployed fabricated LinkedIn recruiter accounts to infiltrate NATO and EU institutions, posing as head‑hunters to solicit sensitive information. The fake profiles, such as the "Kevin Zhang" persona, offered paid reports before requesting classified data, paying recruits...

By Hong Kong Free Press – News (Finance/Business coverage)
NightBeacon's Primary Model Acts as Evaluator for Better Reasoning
SocialMar 28, 2026

NightBeacon's Primary Model Acts as Evaluator for Better Reasoning

One cool component of NightBeacon is different models trained on the same data, but look at the work that the main model does - think of it as an evaluator, judge, or tier 3 soc analyst that looks at the...

By Dave Kennedy
South Korea Launches $13 Million Data Space Pilot Program to Accelerate Secure Data Sharing
NewsMar 28, 2026

South Korea Launches $13 Million Data Space Pilot Program to Accelerate Secure Data Sharing

South Korea's Ministry of Science and ICT and the National Information Society Agency announced a call for Data Space pilot projects, pledging up to 16.8 billion won (about $13 million) for a medical initiative and additional funding for general‑field pilots. The move...

By Pulse
Fidelity's $2.5M Settlement Highlights Persistent Banking Cyber Risks
SocialMar 28, 2026

Fidelity's $2.5M Settlement Highlights Persistent Banking Cyber Risks

Fidelity is preparing to close the door on a class action lawsuit stemming from a recent data breach, agreeing to pay $2.5 million to affected customers. While the settlement amount is relatively modest for a company of Fidelity's scale, the...

By Rich Tehrani
Delete Scam Emails; Verify Through Official Sites Only
SocialMar 28, 2026

Delete Scam Emails; Verify Through Official Sites Only

Another day, another scam 🚨 SSA won’t email you a benefits PDF IRS won’t send account info as an attachment If you get one → delete it. Need info? Go straight to the official site and log in. https://t.co/ambNOfA6NZ

By Kelly Phillips Erb
A New Phishing Scheme Is Targeting NFL and NBA Stars: Here’s How the ‘Adult Film Star’ Scam Works
NewsMar 28, 2026

A New Phishing Scheme Is Targeting NFL and NBA Stars: Here’s How the ‘Adult Film Star’ Scam Works

A Georgia man, Kwamaine Jerell Ford, is accused of running a phishing operation that duped NFL and NBA players by posing as an adult film star. The scheme harvested iCloud credentials, stole credit‑card data and secretly filmed victims during coerced...

By Inc.
Don't YOLO Your File System
NewsMar 28, 2026

Don't YOLO Your File System

Developers are increasingly seeing AI agents wipe files, empty directories, and corrupt home folders when given unrestricted system access. The new open‑source tool jai offers a single‑command sandbox that isolates an agent’s workspace while keeping the current working directory writable....

By Hacker News
TrendAI Report Finds 67% of Firms Push GenAI Forward Amid Rising Security Risks
NewsMar 28, 2026

TrendAI Report Finds 67% of Firms Push GenAI Forward Amid Rising Security Risks

TrendAI's latest survey of 3,700 decision‑makers shows 67% of enterprises are under pressure to adopt generative AI even as they grapple with data‑leak risks, malicious prompts and weak governance. The firm also announced a partnership with NVIDIA to embed security...

By Pulse
Instantly Generate Detection Rules From Any Source
SocialMar 27, 2026

Instantly Generate Detection Rules From Any Source

If you missed this post, it’s a good read on a the ability to rapidly almost instantly push new detection capabilities or gaps within a monitoring environment. I developed a component of NightBeacon called Nexus Intelligence, it’s an agent where you...

By Dave Kennedy
'From 16 Hours to Under 5 Minutes': How Gen AI Is Turning Fraud Into a $400B+ Global Industry — and...
NewsMar 27, 2026

'From 16 Hours to Under 5 Minutes': How Gen AI Is Turning Fraud Into a $400B+ Global Industry — and...

Generative AI is slashing the time needed to craft fraud schemes from over 16 hours to under five minutes. The acceleration has helped push global financial losses past $400 billion in a single year, with two‑thirds of scams succeeding within a...

By TechRadar Pro
Breach of Confidence – 27 March 2026
NewsMar 27, 2026

Breach of Confidence – 27 March 2026

The security community faced a wave of incidents in late March, starting with the compromise of Trivy, a popular open‑source scanner, which turned a defensive tool into an attack vector. A separate breach of McKinsey’s AI platform exposed 22 unauthenticated...

By Security Boulevard
[Expired – Class Action Settlement] [Targeted, CA only] Patelco Credit Union $300 Checking Bonus
BlogMar 27, 2026

[Expired – Class Action Settlement] [Targeted, CA only] Patelco Credit Union $300 Checking Bonus

Patelco Credit Union is offering a $400 new‑account bonus, split into $300 for opening a free or interest checking account, $50 for adding a Money Market account, and $50 for enrolling in the RoundUp savings feature. To earn the $300...

By Doctor of Credit
ShinyHunters Walk Away From BreachForums, Leak 300,000-User Database
NewsMar 27, 2026

ShinyHunters Walk Away From BreachForums, Leak 300,000-User Database

The ShinyHunters hacker collective announced it is abandoning BreachForums, labeling the platform a waste of time after an FBI seizure in October 2025. Simultaneously, the group released a fresh dump containing data on more than 300,000 BreachForums users, including full...

By HackRead
AI‑SOC Tool Deconstructs Attacks, Slashes MTTR and False Positives
SocialMar 27, 2026

AI‑SOC Tool Deconstructs Attacks, Slashes MTTR and False Positives

Here's a small taste of NightBeaconAI (our human driven but AI-SOC augmented solution I've built) @Binary_Defense - it has attack path deconstruction - can see every part of an attack chain with details on each part of it. Doesn't matter...

By Dave Kennedy
F5, Breached by an APT Last Year, Says BIG-IP APM Exploited
NewsMar 27, 2026

F5, Breached by an APT Last Year, Says BIG-IP APM Exploited

F5’s BIG‑IP Access Policy Manager (APM) vulnerability CVE‑2025‑53521 is being actively exploited, granting unauthenticated remote code execution. Attackers can disable SELinux, write in‑memory webshells, and seize control of authentication and VPN services used by Fortune 500 firms. The exploit follows a...

By The Stack (TheStack.technology)
Windows PCs Crash Three Times As Often As Macs, Report Says
NewsMar 27, 2026

Windows PCs Crash Three Times As Often As Macs, Report Says

Omnissa’s 2026 State of Digital Workspace report, based on global telemetry, finds Windows PCs crash 3.1 times more often than Macs and freeze 7.5 times more frequently. Windows devices are typically refreshed every three years, compared with five years for Macs, leading...

By Slashdot
Anthropic’s Mythos Leak Is a Wake-Up Call: Phishing 3.0 Is Already Here
NewsMar 27, 2026

Anthropic’s Mythos Leak Is a Wake-Up Call: Phishing 3.0 Is Already Here

Anthropic’s accidental disclosure of its upcoming Claude Mythos model has ignited concerns about AI‑driven cyber threats, but the real alarm is that today’s publicly available generative AI already powers sophisticated phishing attacks. These models can scrape public data, mimic corporate tone,...

By Security Boulevard
FBI Director Kash Patel and White House Instagram Hacked by Iran
PodcastMar 27, 20260 min

FBI Director Kash Patel and White House Instagram Hacked by Iran

The episode dives into recent Iranian cyber‑operations, focusing on the hack of FBI Director Kash Patel's personal email and the simultaneous breach of the White House's Instagram and X accounts. Host Dean Blundell reviews leaked photos and emails from Patel's...

By Narativ with Zev Shalev
Cyber‑Safety Book Series 'Byte Sized Lessons' Launches for Young Readers
NewsMar 27, 2026

Cyber‑Safety Book Series 'Byte Sized Lessons' Launches for Young Readers

Cybersecurity expert Dr. Rae Rivera has released the children's book series 'Byte Sized Lessons with Zola and Zena,' a playful guide that teaches kids how to spot phishing, create strong passwords and stay safe online. The series is now available...

By Pulse
Secure Tomorrow’s Data Centers with Platform Firmware Resiliency
NewsMar 27, 2026

Secure Tomorrow’s Data Centers with Platform Firmware Resiliency

The National Institute of Standards and Technology released SP800‑193, a framework for platform firmware resiliency (PFR) that guides data‑center operators in protecting, detecting, and recovering from firmware attacks. The standard distinguishes secured boot, which blocks untrusted code, from measured boot,...

By Electronic Design
BSidesSLC 2025 – LLM-Assisted Risk Management For Small Teams & Budgets
NewsMar 27, 2026

BSidesSLC 2025 – LLM-Assisted Risk Management For Small Teams & Budgets

At BSidesSLC 2025, cloud architect Connor Turpin presented a framework for leveraging large‑language models (LLMs) to streamline risk management in security‑constrained environments. He demonstrated how open‑source LLMs can automate vulnerability triage, threat‑intel summarization, and ticket generation for teams with limited...

By Security Boulevard
Skullcandy Taps Riskified for Fraud Prevention
NewsMar 27, 2026

Skullcandy Taps Riskified for Fraud Prevention

Skullcandy partnered with Riskified via the Shopify app to overhaul its fraud‑prevention workflow. By adding a secondary review layer and recalibrating AI‑driven thresholds, the retailer cut its fraud‑decline rate to about 0.1% and kept chargebacks around 0.06% over 12 months....

By Digital Commerce 360
GPT Can’t Trace an Attack Chain. A Purpose-Built Cybersecurity LLM Can.
NewsMar 27, 2026

GPT Can’t Trace an Attack Chain. A Purpose-Built Cybersecurity LLM Can.

Cybersecurity teams face a chronic talent gap, with 4.8 million positions unfilled and 71% of SOC analysts reporting burnout. General‑purpose LLMs like GPT‑4 can summarize alerts but fail to trace attack chains or correlate data across dozens of tools. Purpose‑built cybersecurity...

By Security Boulevard
RSAC 2026: Sonar Shares Why Code Security Must Shift Before CI
NewsMar 27, 2026

RSAC 2026: Sonar Shares Why Code Security Must Shift Before CI

At RSAC 2026, Sonar’s VP of Code Security Jeremy Katz warned that traditional CI/CD checkpoints are no longer sufficient as AI‑assisted, agent‑driven development accelerates code creation. He highlighted a critical gap: security must be applied before code reaches CI, with...

By eSecurity Planet
Biometrics Adoption, Inclusion Gains Depend on Bridging the Understanding Gap
NewsMar 27, 2026

Biometrics Adoption, Inclusion Gains Depend on Bridging the Understanding Gap

Researchers from Hong Kong and Germany examined 22 older Chinese adults’ experiences with biometric payments, finding that convenience and perceived security drive adoption while fears of loss of control and data misuse hinder it. The study, slated for the 2026...

By Biometric Update
Gitleaks Creator Returns with Betterleaks, an Open Source Secrets Scanner for the Agentic Era
NewsMar 27, 2026

Gitleaks Creator Returns with Betterleaks, an Open Source Secrets Scanner for the Agentic Era

The creator of the popular secret‑scanning tool Gitleaks has launched Betterleaks, an open‑source scanner designed as a drop‑in replacement with faster performance and more flexible validation. Backed by AI‑focused security startup Aikido, Betterleaks swaps hard‑coded entropy checks for CEL‑based rules...

By The New Stack
Single-Account Governance Led to $25M DeFi Exploit
SocialMar 27, 2026

Single-Account Governance Led to $25M DeFi Exploit

$25 million stolen. In this episode of Uneasy Money, hosts @kaiynne, @tayvano_ & @LucaNetz are joined by @omeragoldberg to unpack the Resolv exploit and Aave v4 governance approval: 🤔 Why was the USR minting function governed by a single account? ⁉️ How did...

By Laura Shin
AI‑Powered Fraud Evolves Into Fast, Organized Threat
SocialMar 27, 2026

AI‑Powered Fraud Evolves Into Fast, Organized Threat

Fraud has scaled into an organized system driven by AI speed, complex deception methods, and limited response windows for institutions worldwide. https://t.co/daIf9K8o01

By TechRadar
Ransomware Attack Totally Cripples Jackson County Sheriff’s Office in Indiana
NewsMar 27, 2026

Ransomware Attack Totally Cripples Jackson County Sheriff’s Office in Indiana

A ransomware attack crippled the Jackson County Sheriff’s Office IT infrastructure last week. The breach likely began with a phishing email that delivered malicious code, which lay dormant before encrypting files and spreading laterally. The resulting total network outage forced...

By DataBreaches.net
Panasonic Launches First Grid‑scale BESS Cybersecurity Monitoring Trial
SocialMar 27, 2026

Panasonic Launches First Grid‑scale BESS Cybersecurity Monitoring Trial

Panasonic claims world’s first trial of cybersecurity monitoring for grid-scale BESS #energysky -- via pv magazine global: https://t.co/BPgKqiFdUD

By Tor “SolarFred” Valenza
US Puts $10M Bounty on Iranian IOControl Hackers
SocialMar 27, 2026

US Puts $10M Bounty on Iranian IOControl Hackers

US offering $10 million for info on Iranian hackers behind IOControl malware | The Record from Recorded Future News https://t.co/2wnlp84kjx

By Teri Radichel
FBI Confirms Theft of Director’s Personal Emails by Iran-Linked Hacking Group
NewsMar 27, 2026

FBI Confirms Theft of Director’s Personal Emails by Iran-Linked Hacking Group

The FBI confirmed that a hacking group tied to Iran's Ministry of Intelligence and Security, operating under the name Handala, breached the personal email account of FBI Director Kash Patel and leaked photos and routine correspondence from 2010 and 2019....

By The Record by Recorded Future
Systemd's Birthdate Storage Sparks Distro Privacy and Compliance Debate
SocialMar 27, 2026

Systemd's Birthdate Storage Sparks Distro Privacy and Compliance Debate

Recent systemd updates store user birth dates for age verification, causing debate across Linux distros over legal compliance and privacy concerns. https://t.co/lWEa7CN3BT

By TechRadar
Iran-Linked Hackers Breach FBI Director Kash Patel's Email
SocialMar 27, 2026

Iran-Linked Hackers Breach FBI Director Kash Patel's Email

FBI Director Kash Patel's email breached by hackers linked to Iran, sour... https://t.co/CmeuUp2yiA via @YouTube

By Harold (Hal) Good
Cubs' VDX.tv Partner Faces Scrutiny Over Deep Fan Data Collection
NewsMar 27, 2026

Cubs' VDX.tv Partner Faces Scrutiny Over Deep Fan Data Collection

The Chicago Cubs' partnership with VDX.tv, a sports streaming vendor, has come under fire for harvesting extensive fan data—including IP addresses, device identifiers, browsing behavior and location—through cookies that persist for up to 90 days. Privacy advocates warn the practice...

By Pulse
Democrats Question VPN Use Over Foreign Surveillance Risks
SocialMar 27, 2026

Democrats Question VPN Use Over Foreign Surveillance Risks

Six Democrats sent a letter to the Director of National Intelligence seeking clarity on whether using a commercial VPN could strip citizens of their privacy rights by exposing them to foreign surveillance laws. https://t.co/6Uq3Y7oKvv

By TechRadar
IOS 26.4 and iPadOS 26.4 Patch Numerous
SocialMar 27, 2026

IOS 26.4 and iPadOS 26.4 Patch Numerous

A lot of security vulns addressed in this update About the security content of iOS 26.4 and iPadOS 26.4 - Apple Support https://t.co/R0oUJMKheX

By Teri Radichel
AI Security Concerns Intensify as Firms Expand Generative Tools and Face Regulatory Pushback
NewsMar 27, 2026

AI Security Concerns Intensify as Firms Expand Generative Tools and Face Regulatory Pushback

Google rolled out a Gemini feature that moves chats and personal data between bots, Meta announced a $10 billion AI data center in Texas, and a U.S. judge temporarily halted the Pentagon's blacklist of Anthropic. The three developments underscore mounting security...

By Pulse
Google Targets 2029 for Post‑quantum Authentication Rollout
SocialMar 27, 2026

Google Targets 2029 for Post‑quantum Authentication Rollout

Quantum cryptography now has a deadline. Google has announced that it has set 2029 as the year by which it will have migrated authentication services to post-quantum cryptography. Will it win the race to secure against quantum attacks before they...

By Kim Zetter
Palantir Wins £360K FCA Pilot, Boosting Its Government‑Sector Credibility
NewsMar 27, 2026

Palantir Wins £360K FCA Pilot, Boosting Its Government‑Sector Credibility

Palantir Technologies has secured a 12‑week pilot with the UK Financial Conduct Authority worth more than £30,000 a week—about £360,000 ($460,000) in total. The deal gives the data‑analytics firm access to flag fraud, money‑laundering and insider‑trading activity, prompting praise from...

By Pulse
Anthropic’s ‘Mythos’ Model Leaked, Marking a Step‑Change in AI Power
NewsMar 27, 2026

Anthropic’s ‘Mythos’ Model Leaked, Marking a Step‑Change in AI Power

Anthropic disclosed that its unreleased Claude Mythos model, described as a “step change” in AI performance, is being tested with early‑access customers after a Fortune‑reported data leak exposed internal documents. The leak also revealed a new model tier named Capybara,...

By Pulse
Pro-Iran Hackers Claim Breach of FBI Director’s Email
NewsMar 27, 2026

Pro-Iran Hackers Claim Breach of FBI Director’s Email

Pro‑Iran hacktivist group Handala announced it accessed FBI Director Kash Patel’s personal email and posted screenshots online. An insider familiar with the breach said the leaked material appears authentic, though the FBI maintains it contains only historical personal information and...

By FCW (GovExec Technology)