Cybersecurity News and Headlines

OPSWAT Adds Predictive AI Engine to MetaDefender for Pre-Execution Threat Detection
NewsApr 9, 2026

OPSWAT Adds Predictive AI Engine to MetaDefender for Pre-Execution Threat Detection

OPSWAT introduced Predictive Alin AI, its first proprietary AI‑driven threat detection engine, into the MetaDefender platform. The static‑analysis engine predicts malicious intent in milliseconds, delivering sub‑100‑ms inference while maintaining a tiny memory footprint. In internal tests the engine achieved 99.99%...

By Help Net Security
Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities
NewsApr 9, 2026

Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities

Palo Alto Networks and SonicWall each released emergency patches addressing multiple vulnerabilities, including two high‑severity flaws. Palo Alto fixed three bugs—most notably CVE‑2026‑0234 affecting Cortex XSOAR/XSIAM’s Microsoft Teams integration—and added dozens of Chromium security updates. SonicWall patched four issues in...

By SecurityWeek
Russian Hackers Exploit SOHO Routers for DNS Hijacking Campaign
NewsApr 9, 2026

Russian Hackers Exploit SOHO Routers for DNS Hijacking Campaign

Russian-linked threat group Forest Blizzard has been hijacking home and small‑office routers since at least August 2025, turning them into covert DNS infrastructure. Microsoft reported over 200 organizations and more than 5,000 consumer devices infected, enabling passive traffic monitoring and targeted...

By The Cyber Express
New macOS Malware notnullOSX Targets Crypto Wallets Over $10K
NewsApr 9, 2026

New macOS Malware notnullOSX Targets Crypto Wallets Over $10K

A new macOS malware dubbed notnullOSX is targeting cryptocurrency wallets holding more than $10,000. The threat, linked to a hacker known as 0xFFF (now alh1mik), spreads via fake Google Docs warnings and a malicious Terminal command called ClickFix, then requests...

By HackRead
Zephyr Energy Loses £700K in Cyber Hit that Rerouted Contractor Payment
NewsApr 9, 2026

Zephyr Energy Loses £700K in Cyber Hit that Rerouted Contractor Payment

Zephyr Energy plc disclosed a cyber‑fraud incident that diverted about £700,000 (≈$890,000) from a routine contractor payment to an attacker‑controlled account. The attack, described as “highly sophisticated,” hit a U.S. subsidiary but left day‑to‑day operations intact. Zephyr promptly involved law...

By The Register
The Hidden Security Risks of Shadow AI in Enterprises
NewsApr 9, 2026

The Hidden Security Risks of Shadow AI in Enterprises

The article warns that shadow AI—unauthorized artificial‑intelligence tools adopted by employees—creates hidden security gaps in enterprises. A 2024 Salesforce survey shows 55% of workers use AI solutions outside IT approval, exposing data to external platforms. These tools can leak credentials,...

By The Hacker News
Intruder Expands Cloud Security with Agentless Container Image Scanning
NewsApr 9, 2026

Intruder Expands Cloud Security with Agentless Container Image Scanning

Intruder introduced Container Image Scanning, an agent‑less service that automatically checks container images for vulnerabilities across AWS Elastic Container Registry, Google Artifact Registry and Azure Container Registry. The feature runs daily, prioritizing active tags and presenting findings alongside other attack‑surface...

By Help Net Security
Guidance: MOD Law Enforcement Privacy Notices
NewsApr 9, 2026

Guidance: MOD Law Enforcement Privacy Notices

The UK Ministry of Defence (MOD) has updated its Law Enforcement Privacy Notices, originally published in January 2024, to clarify how personal data is processed for policing and security purposes. The April 2026 revision renamed the notice, expanded the "Details" section, and...

By UK Ministry of Defence (GOV.UK)
5 Best Zero Trust Networking Software I Recommend for 2026
NewsApr 9, 2026

5 Best Zero Trust Networking Software I Recommend for 2026

The G2‑based roundup identifies the five leading zero‑trust networking platforms for 2026: Zscaler Private Access, Cisco Duo, Palo Alto Networks IoT/OT Security, Okta, and FortiClient. Each tool was evaluated on policy depth, identity and device integrations, deployment speed, and day‑two...

By G2 Learn
Unstructured Data Is Piling up as AI Risks Rise
NewsApr 9, 2026

Unstructured Data Is Piling up as AI Risks Rise

A new Thales report, based on a survey of 210 IT and security leaders, finds that more than half of enterprises lack full visibility into their unstructured data estates, and 68% say most of that data remains unprotected. Only 9%...

By CIO Dive
CMMC Non-Compliance: Violations of FCA
NewsApr 9, 2026

CMMC Non-Compliance: Violations of FCA

Defense contractors must recognize that CMMC gaps alone do not trigger the False Claims Act, but false statements about compliance do. The FCA targets companies that knowingly assert they meet DoD cybersecurity requirements when evidence or internal knowledge contradicts those...

By Security Boulevard
Why Security Automation Is Changing How Teams Protect Enterprise Networks
NewsApr 9, 2026

Why Security Automation Is Changing How Teams Protect Enterprise Networks

Enterprise security teams face exploding alert volumes and slow manual triage, prompting a shift toward automation. SIEM platforms aggregate and normalize logs, while SOAR solutions execute playbooks that isolate threats, block IPs, and open tickets without human clicks. High‑quality connectors...

By TechBullion
Advenica’s File Scanner Kiosk Scans USB Media for Malware
NewsApr 9, 2026

Advenica’s File Scanner Kiosk Scans USB Media for Malware

Advenica introduced the File Scanner Kiosk, a dedicated appliance that scans USB drives for malware before they connect to corporate networks. The kiosk leverages multiple built‑in antivirus engines and features dual USB ports to handle source and destination media simultaneously....

By Help Net Security
Anthropic’s Mythos Is the Cyberthreat Every CISO Feared
NewsApr 9, 2026

Anthropic’s Mythos Is the Cyberthreat Every CISO Feared

Anthropic is quietly developing Claude Capybara, code‑named Mythos, an AI model that excels at finding vulnerabilities, crafting exploits and chaining multi‑step attacks. The leak of Mythos signals that frontier AI has crossed a cybersecurity threshold, allowing attackers to automate sophisticated code‑review...

By TechCentral (South Africa)
30,000 Private Facebook Images Allegedly Downloaded by Meta Employee
NewsApr 9, 2026

30,000 Private Facebook Images Allegedly Downloaded by Meta Employee

A former Meta employee in London is under criminal investigation for allegedly scripting the download of about 30,000 private Facebook images. The Metropolitan Police cybercrime unit is handling the case, and Meta says it discovered the breach over a year...

By Security Boulevard
Fifth Third Beats Back Impersonation Scams
NewsApr 9, 2026

Fifth Third Beats Back Impersonation Scams

Fifth Third reports a dramatic surge in bank‑impersonation scams, which now represent about 17% of its fraud cases and have tripled since 2024. Fraud leader Kristopher Edwards says scammers are spoofing caller IDs, hijacking search ads, and creating fake social‑media sites...

By Banking Dive
7 Ways to Boost the Privacy of Your Home and Gadgets
NewsApr 9, 2026

7 Ways to Boost the Privacy of Your Home and Gadgets

Privacy concerns are infiltrating everyday homes as smart devices collect more data than users realize. Experts advise treating gadgets as computers, disabling unused features, and favoring physical controls like camera shutters. Storing video locally rather than in the cloud reduces...

By CNET – Gaming
Governance Gaps Emerge as AI Agents Drive 76% Increase in NHIs
NewsApr 9, 2026

Governance Gaps Emerge as AI Agents Drive 76% Increase in NHIs

The SANS Institute’s 2026 State of Identity Threats & Defenses Survey reveals a 76 % rise in non‑human identities (NHIs) as AI agents proliferate across enterprises. Seventy‑four percent of firms already deploy AI agents that require credentials, causing NHIs to double...

By Infosecurity Magazine
Google Warns of New Campaign Targeting BPOs to Steal Corporate Data
NewsApr 9, 2026

Google Warns of New Campaign Targeting BPOs to Steal Corporate Data

Google’s Threat Intelligence Group has identified a financially motivated actor, tracked as UNC6783, launching a focused campaign against business process outsourcing firms to pilfer data from their high‑value corporate clients. The group uses live‑chat lures, spoofed Okta login pages and...

By SecurityWeek
It’s Not Just Spyware Scandals: EU Is Funding the Industry that Spies on Europeans
NewsApr 9, 2026

It’s Not Just Spyware Scandals: EU Is Funding the Industry that Spies on Europeans

In February 2026 a Greek court sentenced four people, including Intellexa executives, for the Predator spyware scandal that targeted journalists, politicians and business leaders. Investigations reveal that EU programmes such as the European Defence Fund, Horizon research, and the European...

By EUobserver (EU)
AI Supercharges Scams as ASIC Hits Record Takedowns
NewsApr 9, 2026

AI Supercharges Scams as ASIC Hits Record Takedowns

Australia’s securities regulator ASIC dismantled a record 11,964 phishing and investment‑scam websites in 2025, a 90% jump from the 6,270 sites removed in 2024. The surge coincides with scammers exploiting artificial‑intelligence tools to craft more convincing fraud content. Despite the...

By Fintech Global
Signature Healthcare Cyberattack Causes Service Disruptions, Treatment Delays
NewsApr 9, 2026

Signature Healthcare Cyberattack Causes Service Disruptions, Treatment Delays

Signature Healthcare detected a cyberattack on April 6, 2026, prompting the network to shift to emergency downtime procedures. The breach forced the Brockton Hospital to divert ambulances, cancel chemotherapy infusions, and rely on manual workflows, while surgeries and urgent care continued...

By The Cyber Express
Use of Unauthorised AI Sparks Security and Compliance Concerns for Businesses
NewsApr 9, 2026

Use of Unauthorised AI Sparks Security and Compliance Concerns for Businesses

Two thirds of UK business leaders worry about data security and compliance risks from employees' unauthorised AI use, according to a Studio Graphene‑commissioned poll of 500 senior managers. The survey found 48% suspect shadow AI tools are in use, rising...

By Workplace Insight
Patch Windows Collapse as Time-to-Exploit Accelerates
NewsApr 9, 2026

Patch Windows Collapse as Time-to-Exploit Accelerates

Rapid7’s 2026 Threat Landscape Report shows confirmed exploitation of high‑ and critical‑severity vulnerabilities more than doubled, rising to 146 incidents in 2025 from 71 in 2024. The median time from public disclosure to inclusion in CISA’s Known Exploited Vulnerabilities list...

By CSO Online
Adobe Reader Zero-Day Exploited for Months: Researcher
NewsApr 9, 2026

Adobe Reader Zero-Day Exploited for Months: Researcher

A researcher has identified an actively exploited zero‑day vulnerability in Adobe Reader, discovered through a malicious PDF that can harvest system data and may enable remote code execution or sandbox escape. The exploit has been observed in the wild since...

By SecurityWeek
Google Warns of New Threat Group Targeting BPOs and Helpdesks
NewsApr 9, 2026

Google Warns of New Threat Group Targeting BPOs and Helpdesks

Google’s Threat Intelligence Group has identified a new financially motivated threat cluster, UNC6783, targeting business process outsourcers and enterprise helpdesks. The group leverages live‑chat interactions to direct victims to spoofed Okta login pages and malicious Zendesk‑support domains, stealing clipboard data...

By Infosecurity Magazine
68% of Banks Increase Fraud Defense Spending as Account Takeovers Spike
NewsApr 9, 2026

68% of Banks Increase Fraud Defense Spending as Account Takeovers Spike

Banks are rapidly reclassifying fraud defense from a reactive cost center to core infrastructure, driven by a surge in account‑takeover attacks. The PYMNTS 2025 State of Fraud report shows unauthorized‑party fraud now represents 71% of incidents and losses, pushing average...

By PYMNTS
CLEAR1 Achieves FedRAMP® ‘In Process’ Designation to Support Public Sector and Regulated Industries
NewsApr 9, 2026

CLEAR1 Achieves FedRAMP® ‘In Process’ Designation to Support Public Sector and Regulated Industries

CLEAR 1, the secure identity platform of CLEAR (NYSE: YOU), has earned a FedRAMP Moderate “In Process” designation and is now listed on the FedRAMP Marketplace. The milestone builds on CLEAR’s contract with CMS to modernize Medicare.gov identity verification and signals...

By Airport Industry-News
Vibe Coding Is the New Shadow IT
NewsApr 9, 2026

Vibe Coding Is the New Shadow IT

Generative AI has turned shadow IT into "vibe coding," where employees create applications using natural‑language prompts. While the approach accelerates prototyping and lets non‑developers build tools, the resulting code often lacks testing, security reviews, and documentation. Enterprises face rogue apps...

By Gestalt IT
Quantum-Safe Email: S/MIME and Post-Quantum Email Security
NewsApr 9, 2026

Quantum-Safe Email: S/MIME and Post-Quantum Email Security

The article warns that today’s S/MIME email encryption, built on RSA and ECC, will become vulnerable once practical quantum computers arrive. Quantum algorithms like Shor’s could crack RSA‑2048 in hours, exposing corporate contracts, financial data, and intellectual property. The U.S....

By Security Boulevard
Bitcoin Depot Discloses $3.6 Million Crypto Theft Following System Breach
NewsApr 9, 2026

Bitcoin Depot Discloses $3.6 Million Crypto Theft Following System Breach

Bitcoin Depot disclosed that on March 23, 2026 attackers siphoned 50.903 Bitcoin, roughly $3.665 million, from its internal settlement wallets after breaching corporate IT systems. The breach was limited to internal credentials and did not affect customer‑facing platforms or data. Bitcoin...

By The Cyber Express
Kenya’s Cyber Threats Surge 441% in Three Months as Defence Gap Widens
NewsApr 9, 2026

Kenya’s Cyber Threats Surge 441% in Three Months as Defence Gap Widens

Kenya’s Computer Incident Response Centre reported a 441% jump in cyber threat events, reaching 4.6 billion incidents in the fourth quarter of 2025 – the sharpest rise in at least three years. Distributed Denial‑of‑Service attacks exploded by 1,117% quarter‑on‑quarter, yet advisory...

By TechCabal
DRAM’s Whac‑A‑Mole Security Crisis
NewsApr 9, 2026

DRAM’s Whac‑A‑Mole Security Crisis

Rowhammer remains a pervasive DRAM security flaw, and a newer variant called Rowpress is emerging as a complementary threat. Memory manufacturers have introduced refresh‑management commands—RFM, ARFM and DRFM—to target vulnerable rows, yet these mitigations are imperfect and can be weaponized....

By Semiconductor Engineering
Why Incident Response Has Become a Core Responsibility for MSPs
NewsApr 9, 2026

Why Incident Response Has Become a Core Responsibility for MSPs

Recent high‑profile cyber breaches in the UK have highlighted that many organizations are unprepared for the aftermath of an intrusion. While technical safeguards remain essential, customers now judge managed service providers (MSPs) on their ability to execute a robust incident...

By ITPro
Quantum Computers and Post-Quantum Security
NewsApr 9, 2026

Quantum Computers and Post-Quantum Security

Swiss financial infrastructure operator SIX is accelerating its shift to post‑quantum cryptography as quantum computers threaten current asymmetric encryption. The firm has launched a comprehensive crypto‑inventory, built crypto‑agility into its systems, and begun hybrid testing of NIST‑standardized PQC algorithms. By...

By SIX Swiss Exchange – ETFs (news/resources)
Your MCP Server Is a Resource Server Now. Act Like It.
NewsApr 9, 2026

Your MCP Server Is a Resource Server Now. Act Like It.

The March 26 2025 revision of the MCP specification reclassifies MCP servers as OAuth 2.0 resource servers, demanding a formal identity layer. The article walks through building an identity gateway that uses Keycloak, Maverics, OPA policies, and RFC 8693 token‑exchange to give Claude‑style AI...

By Security Boulevard
$3.6 Million Stolen in Bitcoin Depot Hack
NewsApr 9, 2026

$3.6 Million Stolen in Bitcoin Depot Hack

Bitcoin Depot, the largest U.S. Bitcoin ATM operator, disclosed that hackers stole roughly 50.903 BTC, valued at about $3.6 million, after breaching its corporate IT systems on March 23. The company says the intrusion was limited to internal wallets and did not affect...

By SecurityWeek
NCSC Warns of Russian Cyber Hijack Threat
NewsApr 9, 2026

NCSC Warns of Russian Cyber Hijack Threat

The UK National Cyber Security Centre (NCSC) warned that Russian state‑linked group APT28 is hijacking popular routers such as TP‑Link and MikroTik to reroute internet traffic through malicious DNS servers. By compromising these devices, the group conducts man‑in‑the‑middle attacks that...

By UKAuthority (UK)
AI Agent Intent Is a Starting Point, Not a Security Strategy
NewsApr 9, 2026

AI Agent Intent Is a Starting Point, Not a Security Strategy

Token Security’s research reveals that 65% of agentic chatbots retain live access credentials despite never being used, and 51% of their external actions depend on hard‑coded keys. The study highlights how AI agents are treated as disposable experiments, creating orphaned...

By Help Net Security
Asqav: Open-Source SDK for AI Agent Governance
NewsApr 9, 2026

Asqav: Open-Source SDK for AI Agent Governance

Asqav is an open‑source Python SDK that cryptographically signs every autonomous AI agent action using the quantum‑safe ML‑DSA‑65 algorithm and links entries in a tamper‑evident hash chain. The toolkit integrates with five popular agent frameworks—including LangChain and OpenAI Agents—and offers...

By Help Net Security
Hong Kong Police Arrest Man Suspected of Stealing 56,000 Hospital Authority Patients’ Personal Data
NewsApr 9, 2026

Hong Kong Police Arrest Man Suspected of Stealing 56,000 Hospital Authority Patients’ Personal Data

Hong Kong police arrested a 30‑year‑old contractor employee suspected of downloading personal data of more than 56,000 Hospital Authority patients. The breach, traced to two contractor offices in the New Territories, involved surgical‑procedure details but not full medical records. Authorities...

By Hong Kong Free Press – News (Finance/Business coverage)
Phishers Sneak Through Using GitHub and Jira’s Own Mail Delivery Infrastructure
NewsApr 9, 2026

Phishers Sneak Through Using GitHub and Jira’s Own Mail Delivery Infrastructure

Security researchers at Cisco Talos have uncovered a new phishing vector that hijacks the native notification systems of SaaS platforms such as GitHub and Atlassian Jira. By embedding malicious text in commit summaries or Jira project fields, attackers trigger automatic...

By Help Net Security
Prompt Injection Tags Along as GenAI Enters Daily Government Use
NewsApr 9, 2026

Prompt Injection Tags Along as GenAI Enters Daily Government Use

State and territorial governments are now using generative AI (GenAI) in everyday workflows, with 82% of CIOs reporting daily usage—a jump from 53% a year earlier. As adoption expands, the Center for Internet Security warns that prompt injection—malicious instructions hidden...

By Help Net Security
AusPost Warns of Growing Online Scam Threat
NewsApr 9, 2026

AusPost Warns of Growing Online Scam Threat

Australia Post warns that scams targeting sellers on online marketplaces have surged, with more than 2,500 reports this year. Fraudsters pose as buyers on platforms like Facebook Marketplace, sending fake QR codes or links that mimic Australia Post’s courier service...

By Inside Retail Australia
Quantum-Secure Satellite Communications and the Future of Protected Networks
NewsApr 9, 2026

Quantum-Secure Satellite Communications and the Future of Protected Networks

Quantum‑secure satellite communications are transitioning from concept to early service architecture, using quantum key distribution from orbit to protect high‑value links. Government programs such as ESA’s SAGA, the QKDSat‑Redwire partnership, and Canada’s QEYSSat illustrate strategic investment driven by sovereignty and...

By New Space Economy
Shaky Ceasefire Unlikely to Stop Cyberattacks From Iran-Linked Hackers for Long
NewsApr 9, 2026

Shaky Ceasefire Unlikely to Stop Cyberattacks From Iran-Linked Hackers for Long

A tentative cease‑fire between Iran, the United States and Israel is unlikely to halt cyber attacks from Iran‑linked groups. Pro‑Iranian hacktivist collective Handala announced it will pause attacks on U.S. targets but continue striking Israel, warning it will resume U.S....

By SecurityWeek
Fake QR Codes Make for Easy Scams – Be Careful What You Scan Out There
NewsApr 9, 2026

Fake QR Codes Make for Easy Scams – Be Careful What You Scan Out There

QR codes have become ubiquitous for payments, menus, and transport, but their convenience also makes them a prime vector for scams. Cybercriminals employ "quishing"—QR‑based phishing—to redirect users to counterfeit login or payment sites, often by overlaying fake stickers on legitimate...

By The Conversation – Business + Economy (US)
Russia's Forest Blizzard Nabs Rafts of Logins Via SOHO Routers
NewsApr 9, 2026

Russia's Forest Blizzard Nabs Rafts of Logins Via SOHO Routers

Russian GRU‑backed APT28, also known as Fancy Bear, has been exploiting long‑standing bugs in consumer‑grade SOHO routers such as MikroTik and TP‑Link to intercept web traffic worldwide. By reconfiguring DNS settings on compromised devices, the group silently siphons email credentials and...

By Dark Reading
Stateless Hash-Based Signatures for AI Model Weight Integrity
NewsApr 9, 2026

Stateless Hash-Based Signatures for AI Model Weight Integrity

Enterprises deploying AI agents with Model Context Protocol (MCP) must test cryptographic safeguards in realistic cloud sandboxes. Simulating post‑quantum algorithms such as Kyber and Dilithium on high‑entropy instances reveals significant CPU and latency overhead, especially under heavy agent loads. Proper...

By Security Boulevard