Today's Cybersecurity Pulse
Anthropic CEO meets White House over federal access to Mythos AI
Anthropic CEO Dario Amodei will meet White House chief of staff Susie Wiles to discuss government access to the company's Mythos AI model, which can discover and exploit zero‑day vulnerabilities. The meeting follows a Pentagon‑imposed blacklist after Amodei refused to lift safety restrictions, while Treasury, intelligence agencies and CISA are already testing the model.
Also developing:
By the numbers: Artemis raises $70M in combined seed and Series A round

Class Action Targets Berkadia over Alleged Cyberattack Exposing Thousands' Data
Berkadia Commercial Mortgage, the leading Freddie Mac lender, faces a proposed class action alleging a March 20 cyberattack by the ShinyHunters group. The breach reportedly exposed thousands of individuals' personal and financial data, including Social Security numbers and banking details. Plaintiffs claim Berkadia failed to meet NIST and CIS security standards and did not notify victims or regulators within three weeks. The lawsuit seeks more than $5 million in damages and at least ten years of credit‑monitoring services for affected parties.
![Android Phones Aren’t at Risk of Long-Standing iPhone Tap-to-Pay Vulnerability [Video]](/cdn-cgi/image/width=1200,quality=75,format=auto,fit=cover/https://i0.wp.com/9to5google.com/wp-content/uploads/sites/4/2026/04/iphone-tap-to-pay-vulnerability-veritasium.webp?resize=1200%2C628&quality=82&strip=all&ssl=1)
Android Phones Aren’t at Risk of Long-Standing iPhone Tap-to-Pay Vulnerability [Video]
A five‑year‑old tap‑to‑pay flaw in iPhone’s Express mode lets large transit purchases bypass the lock screen, a vulnerability highlighted in a recent Veritasium video. Apple and Visa have been aware of the issue since 2021, but claim it falls under...

Fiverr Denies ‘Major Security Lapse’ Despite Private User Data Appearing in Google Search
Fiverr says there is no major security breach, but a misconfigured Cloudinary storage bucket left private user documents publicly accessible. PDFs, images, tax forms and other sensitive files were indexed by Google after the platform used permanent URLs instead of...

The Myth of the CMMC “Easy Button:” Why Shortcuts Usually Collapse Under Scrutiny From a Third-Party Assessor
Defense contractors face intense pressure to meet CMMC Level 2 requirements on compressed timelines, turning what was once a planning exercise into a contractual mandate. The article warns that shortcuts—such as relying on shared multi‑tenant environments or skipping a proven reference...

The Transparency Tax: The Cost of Not Knowing What’s in Your Software
The article introduces the "transparency tax," the hidden operational cost organizations incur when they lack continuous visibility into the components of their software. It cites past supply‑chain attacks—such as Log4Shell, which averaged over $90,000 in incident‑response costs—to illustrate how manual...

Maine Rejects Broad Privacy Bill
Maine lawmakers rejected the Maine Online Data Privacy Act (LD 1822), a sweeping proposal that would have restricted data collection, mandated opt‑outs for behaviorally targeted advertising, and banned the sale of sensitive information such as biometric, genetic, and race data. The...
How AI Hackers Will Shake up Cyber-Security
Anthropic announced its newest AI model, Mythos, will not be publicly released. Instead, access is limited to the 12 founding members of Project Glasswing, a consortium that includes Apple, Google and Nvidia. The move reflects growing concerns that advanced generative...

NIST to Limit Work on CVE Entries as Submissions Surge
The National Institute of Standards and Technology (NIST) announced it will limit enrichment of CVE entries to those meeting a new risk‑based threshold, ending its practice of adding details to every vulnerability. Submissions in the first quarter of 2026 are...
News Alert: NTT Research Launches SaltGrain—Advanced Attribute-Based Encryption Security
NTT Research unveiled Scale Academy, an incubator that will commercialize its lab inventions, and launched its first product, SaltGrain, a zero‑trust data‑security suite built on attribute‑based encryption (ABE). The suite binds access policies to ciphertext, enabling granular control over who...
Testing Opus 4.6: Is VPC Security Deployment Restored?
Ok…let’s try again and see if Opus 4.6 🤖 is any better than the last time I tried it and if it can deploy my VPC endpoint security groups correctly now. Is it still nerfed for everyone else or only...

As AI Infosec Woes Heighten, IBM Intros Autonomous Security Service
IBM unveiled its Autonomous Security service, an AI‑agent platform that scans software exposures and runtime environments to automatically identify and remediate vulnerabilities. The launch coincides with heightened concern over Anthropic's Mythos and OpenAI's GPT‑5.4‑Cyber models, which can uncover thousands of...

Navigating the Unique Security Risks of Asia's Digital Supply Chain
At Black Hat Asia 2026, a panel of security leaders from Bitdefender, ISACA, Varonis and others will dissect the unique third‑party risk landscape of Asia’s hyper‑connected digital supply chain. The discussion highlights how divergent regulations across countries—exemplified by a U.S....
SAP Security Patch Day April 2026: Critical Vulnerabilities, CVSS 9.9 SQL Injection, and Authorization Risks
On April 2026 SAP released its monthly Security Patch Day, publishing 19 new security notes and an update. The most critical issue is a CVSS 9.9 SQL injection vulnerability in SAP Business Planning and Consolidation and SAP Business Warehouse that...
CIOs Fret over Rising Security Concerns Amid AI Adoption
A Logicalis survey of more than 1,000 CIOs reveals AI is now viewed as a top security threat, with over a quarter ranking it alongside malware, ransomware and phishing. 57% say employee misuse of AI jeopardizes data, yet only 37% have...

Five Carriers Got Breached. They Wouldn't Insure Themselves
Over the past year ransomware group Scattered Spider breached five major insurers—Beacon Mutual, Farmers, Erie, Philadelphia Insurance Companies, and Aflac—by exploiting help‑desk social engineering, incomplete multi‑factor authentication, and weak endpoint monitoring. Those same control failures are now non‑negotiable requirements in...

98% of Buyers Will Ask About Your AI Agents at Renewal
Okta announced the general availability of its AI Agent solution on April 30, giving enterprises a reference implementation for discovering, governing, and revoking autonomous AI agents. A survey of 150 IT decision makers revealed that 98% will factor agent‑governance controls...

Ukraine Warns of Surge in Cyberattacks on Hospitals, Local Governments by UAC-0247 Hackers
Ukrainian cyber‑defense agency CERT‑UA reported a sharp increase in attacks by the UAC‑0247 threat cluster targeting hospitals, emergency services, and local government bodies between March and April 2026. The campaign uses phishing emails that pose as humanitarian aid offers, delivering...

Copy of Trump’s Cyber Strategy Is a Strong Playbook, but It’s All in the Execution
The White House released a new National Cyber Strategy that structures U.S. cyber policy into six pillars, ranging from offensive capabilities to workforce development. While the document names Russia and China as top adversaries and outlines modernizing steps like zero‑trust...

Aave Labs Launches Checkpoint, AI-Powered Governance Security System: Aave Labs
Aave Labs unveiled Aave Checkpoint on April 15, an AI‑powered governance security system that adds a multi‑layered review process for every DAO proposal before on‑chain execution. The platform pairs automated AI analysis with a mandatory human verification step, operating alongside Certora’s...

DefenseClaw, MAESTRO, and the Security Boundary Agentic AI Has Been Missing
DefenseClaw is an open‑source security control plane built for the OpenClaw autonomous AI agent. It centralizes asset scanning, AI Bill of Materials generation, policy enforcement, and optional NVIDIA OpenShell sandboxing to protect both supply‑chain and runtime operations. By integrating Cisco...

Connecticut’s CISO Pushes a Unified, Outcome-Driven Cyber Strategy
Connecticut’s chief information security officer Gene Meltser warned that tool sprawl, not lack of technology, is the state’s biggest cyber risk. He advocated a unified, identity‑centric security stack that emphasizes risk reduction over product count. By consolidating overlapping solutions and...

NTT Scale Academy: Quantum Startup Incubator
NTT Research unveiled Scale Academy, a startup incubator aimed at turning its lab discoveries into market‑ready products. Its first offering, SaltGrain, is a zero‑trust data security suite built on attribute‑based encryption originally proposed by Sahai and Waters. The suite provides...
Run OpenClaw in the Cloud, Not on Your Laptop
OpenClaw is the best AI agent I've ever used. I run it every single day. But if you asked me to run it on my laptop full-time, I'd say you're making a mistake. OpenClaw is brilliant for accessing your files, reading your apps,...
PCI Pal Earns HITRUST and SOC 2 Type II Certifications
PCI Pal announced it has earned both SOC 2 Type II attestation and HITRUST certification, confirming the robustness of its data protection, governance, and risk‑management controls. The certifications were achieved alongside a formal alignment with HIPAA requirements, strengthening the company’s offering for...

UK Businesses Must Face up to AI Threat, Says Government
The UK government warned that frontier AI models, exemplified by Anthropic’s Mythos, can autonomously discover and exploit software vulnerabilities, a capability that is doubling every four months. Business Secretary Liz Kendall said these models shift cyber threats from a few...

Expect More Cybersecurity Executive Orders Soon, National Cyber Director Says
President Donald Trump is expected to sign additional cybersecurity‑focused executive orders soon, National Cyber Director Sean Cairncross said at the Semafor World Economy forum. The move follows the release of the administration’s second national cyber strategy, which outlines goals such...

Commvault Launches a ‘Ctrl-Z’ for Cloud AI Workloads
Commvault unveiled AI Protect, a cloud‑native solution that detects, monitors, and reverses actions taken by autonomous AI agents in AWS, Azure and Google Cloud. The platform continuously scans for hidden or "shadow" AI workloads, logs every API call, and can...

Microsoft's Latest Windows Update Now Confirms if Your PC Is Secure Boot-Protected - How It Works
Microsoft’s April 2026 Patch Tuesday adds a visual Secure Boot status indicator to Windows 10 and Windows 11, showing green, yellow, or red icons that reflect the health of the boot‑chain certificates. The update also replaces aging Secure Boot certificates that will expire in...
Microsoft Pays $2.3M for Cloud and AI Flaws at Zero Day Quest
Microsoft awarded $2.3 million to security researchers after the 2026 Zero Day Quest, recognizing over 80 high‑impact cloud and AI flaws uncovered during the live event. The contest attracted nearly 700 submissions from participants in more than 20 countries, building on...
Open-Source AI Isn’t Riskier; Both Need Shared Security
Weird how some people always target open-source in AI! First it was: “Open-source AI will destroy the world” (spoiler: it didn't and it won't) Now: “Open-source is a cybersecurity threat because of AI” Both narratives are far too simplistic. The truth is that the exact...
Halcyon Names Dave Hannigan as Field CISO to Bolster Anti‑Ransomware Push
Halcyon, the anti‑ransomware platform, announced on April 14, 2026 that Dave Hannigan will serve as its Field Chief Information Security Officer. The role places a seasoned security executive directly with customers and partners to drive ransomware resilience, underscoring the growing...
AI Leaders Face Growing Physical Threats
A new and troubling risk is emerging around AI. An attacker targeting Sam Altman reportedly had a broader list of AI executives, raising concerns that individuals in the industry could become targets. It signals a shift. As AI’s influence grows, so do...
Ransomware Claims Surge 30.7% in 2025, Outpacing Security Spending 10.1%
CipherCue reported a 30.7% year‑over‑year rise in ransomware leak‑site claims for 2025, while Gartner forecasts only a 10.1% increase in worldwide information‑security spending. The disparity signals that ransomware activity is accelerating far faster than defensive investment.

Get Ahead of Cybersecurity Concerns With This Training Bundle for $20
Entrepreneur is promoting the 2026 AI Security & Cybersecurity Expert Bundle, a six‑course package from Oak Academy that delivers more than 85 hours of instruction on AI safety, penetration testing, and CompTIA exam prep. The bundle is priced at $19.97,...

Microsoft Issues Massive Windows Patch for 160+ Bugs, Including Two Zero-Days
Microsoft rolled out its second‑largest monthly update, patching 165 vulnerabilities, including two zero‑day flaws in SharePoint Server and Microsoft Defender. The patch marks a sharp rise in reported bugs, a trend analysts link to AI‑generated vulnerability disclosures. Eight critical bugs,...
Agentic AI Changes the Shape of Trust
Enterprises built identity models around human logins, but agentic AI is reshaping that foundation. Delegated and autonomous AI agents assume roles, cache credentials, and create access paths that persist long after a task ends, making attribution difficult. Traditional IAM and...

European Cybersecurity Agency ENISA Seeks Top-Tier Status in CVE Program
ENISA, the EU’s cybersecurity agency, is pursuing top‑level root CVE Numbering Authority (TL‑Root CNA) status, aiming for approval by 2026 or early 2027. The move follows ENISA’s recent elevation to a root CNA in 2025 and would place it alongside...

Cybersecurity Experts Raise the Alarm over Windows Recall Again: 'The Vault Door Is Titanium. The Wall Next to It Is...
Microsoft’s AI‑driven Windows Recall feature, which records a visual timeline of user activity, has been redesigned after multiple recalls, but security researcher Alexander Hagenah has released a tool called TotalRecall Reloaded that can siphon the vault’s decrypted data. Hagenah argues...
Scammers Use Telegram Tools to Defeat Bank Facial Recognition
Scammers are buying tools advertised on Telegram that trick banks' facial recognition checks. The stakes are enormous with crypto scams tallying an estimated $17 billion in 2025 alone. Banks and regulators are struggling to keep up.
Beware: Fake iCloud Emails Exploit Urgency to Harvest Data
Fraudulent iCloud emails use urgency and imitation tactics to trick users into revealing sensitive information through malicious links and deceptive interfaces. https://t.co/jXuLGQLiXZ
Quantum Threat Makes Satoshi Identity Verifiable by Anyone
"Anyone can prove they are Satoshi" - @tayvano_ on how quantum could affect BIP-316 https://t.co/CkpfDikm9E
AI in Cybersecurity Will Mostly Augment, Not Replace, by 2027
Fun insight from @Gartner_inc "By 2027, 90% of successful AI implementations in cybersecurity will be tactical — task automation and process augmentation — rather than role replacement." (https://t.co/EC2MwkKYqC)
OpenClaw Secured with Docker Sandbox and Clawvisor
It’s April now OpenClaw with docker sandbox, logging mitmproxy firewall and Clawvisor and you are good to go The days of “it’s insecure” for OpenClaw are over
AWS Secrets Manager Adds Hybrid Post‑quantum TLS Protection
AWS Secrets Manager now supports hybrid post-quantum TLS to protect secrets from quantum threats - AWS https://t.co/R5k8MdDFoR
Hackers Bought Failing WP Plugin Firm, Infected All Products
A malicious actor found a struggling WordPress plugin company, bought it, and introduced malware to each product. https://t.co/IYQ5itMM0s
Generic Patch Urgings Trigger My Context‑blind Security Advice
This is my "psychoanalysis by X" thread, yes, another one. Why am I so triggered by advice "patch this immediately" given with no awareness of my business/mission? (1/5)
AWS Should Evolve CloudWatch Into a True SIEM
AWS needs to extend CloudWatch with tools that make it a real SIEM. Don’t overlay it with complexities it doesn’t need. Just extend it.
AI Agents Can Steal GitHub Credentials—No Warnings From Providers
I personally do not give AI agents access to my GitHub repo. It is not rocket science to check out the code and let agents access it in a locked down sandbox,
Track Security Compute Like Stars for Open-Source Trust
If finding security flaws is fully automated with frontier models à la Mythos, then GitHub should have a metric, like stars, showing how much compute is spent securing/hardening an open-source package. Example: 📦 linus/linux ⭐️ 200k 🦾 $239M Only way OSS can...
AI Agent Detects Critical Solana Vulnerability, Boosting Blockchain Defense
Earlier this year, an AI agent from Anatomist Security found a critical Solana vulnerability. Built by Kevin Wang’s team, it shows deep expertise and uses AI to protect the blockchain before bad actors strike. https://t.co/jba6oMX8TQ