
Don’t Just Fight Fraud, Hunt It
The article warns that AI has transformed fraud into an industrialized, global enterprise that can create tens of thousands of synthetic identities in days. Traditional detection methods—such as tracking reused emails or devices—are rapidly losing relevance, with unique email patterns expected by 2027. Socure’s research shows fraudsters now leverage AI‑driven identity farms to bypass verification and siphon funds across sectors. A proactive, cross‑industry intelligence approach is urged to hunt fraud before it embeds itself.
OPSWAT Adds Predictive AI Engine to MetaDefender for Pre-Execution Threat Detection
OPSWAT introduced Predictive Alin AI, its first proprietary AI‑driven threat detection engine, into the MetaDefender platform. The static‑analysis engine predicts malicious intent in milliseconds, delivering sub‑100‑ms inference while maintaining a tiny memory footprint. In internal tests the engine achieved 99.99%...

Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities
Palo Alto Networks and SonicWall each released emergency patches addressing multiple vulnerabilities, including two high‑severity flaws. Palo Alto fixed three bugs—most notably CVE‑2026‑0234 affecting Cortex XSOAR/XSIAM’s Microsoft Teams integration—and added dozens of Chromium security updates. SonicWall patched four issues in...

Russian Hackers Exploit SOHO Routers for DNS Hijacking Campaign
Russian-linked threat group Forest Blizzard has been hijacking home and small‑office routers since at least August 2025, turning them into covert DNS infrastructure. Microsoft reported over 200 organizations and more than 5,000 consumer devices infected, enabling passive traffic monitoring and targeted...

New macOS Malware notnullOSX Targets Crypto Wallets Over $10K
A new macOS malware dubbed notnullOSX is targeting cryptocurrency wallets holding more than $10,000. The threat, linked to a hacker known as 0xFFF (now alh1mik), spreads via fake Google Docs warnings and a malicious Terminal command called ClickFix, then requests...

Zephyr Energy Loses £700K in Cyber Hit that Rerouted Contractor Payment
Zephyr Energy plc disclosed a cyber‑fraud incident that diverted about £700,000 (≈$890,000) from a routine contractor payment to an attacker‑controlled account. The attack, described as “highly sophisticated,” hit a U.S. subsidiary but left day‑to‑day operations intact. Zephyr promptly involved law...

The Hidden Security Risks of Shadow AI in Enterprises
The article warns that shadow AI—unauthorized artificial‑intelligence tools adopted by employees—creates hidden security gaps in enterprises. A 2024 Salesforce survey shows 55% of workers use AI solutions outside IT approval, exposing data to external platforms. These tools can leak credentials,...

Intruder Expands Cloud Security with Agentless Container Image Scanning
Intruder introduced Container Image Scanning, an agent‑less service that automatically checks container images for vulnerabilities across AWS Elastic Container Registry, Google Artifact Registry and Azure Container Registry. The feature runs daily, prioritizing active tags and presenting findings alongside other attack‑surface...

Guidance: MOD Law Enforcement Privacy Notices
The UK Ministry of Defence (MOD) has updated its Law Enforcement Privacy Notices, originally published in January 2024, to clarify how personal data is processed for policing and security purposes. The April 2026 revision renamed the notice, expanded the "Details" section, and...
5 Best Zero Trust Networking Software I Recommend for 2026
The G2‑based roundup identifies the five leading zero‑trust networking platforms for 2026: Zscaler Private Access, Cisco Duo, Palo Alto Networks IoT/OT Security, Okta, and FortiClient. Each tool was evaluated on policy depth, identity and device integrations, deployment speed, and day‑two...
Unstructured Data Is Piling up as AI Risks Rise
A new Thales report, based on a survey of 210 IT and security leaders, finds that more than half of enterprises lack full visibility into their unstructured data estates, and 68% say most of that data remains unprotected. Only 9%...

CMMC Non-Compliance: Violations of FCA
Defense contractors must recognize that CMMC gaps alone do not trigger the False Claims Act, but false statements about compliance do. The FCA targets companies that knowingly assert they meet DoD cybersecurity requirements when evidence or internal knowledge contradicts those...
Why Security Automation Is Changing How Teams Protect Enterprise Networks
Enterprise security teams face exploding alert volumes and slow manual triage, prompting a shift toward automation. SIEM platforms aggregate and normalize logs, while SOAR solutions execute playbooks that isolate threats, block IPs, and open tickets without human clicks. High‑quality connectors...

Advenica’s File Scanner Kiosk Scans USB Media for Malware
Advenica introduced the File Scanner Kiosk, a dedicated appliance that scans USB drives for malware before they connect to corporate networks. The kiosk leverages multiple built‑in antivirus engines and features dual USB ports to handle source and destination media simultaneously....

Anthropic’s Mythos Is the Cyberthreat Every CISO Feared
Anthropic is quietly developing Claude Capybara, code‑named Mythos, an AI model that excels at finding vulnerabilities, crafting exploits and chaining multi‑step attacks. The leak of Mythos signals that frontier AI has crossed a cybersecurity threshold, allowing attackers to automate sophisticated code‑review...

30,000 Private Facebook Images Allegedly Downloaded by Meta Employee
A former Meta employee in London is under criminal investigation for allegedly scripting the download of about 30,000 private Facebook images. The Metropolitan Police cybercrime unit is handling the case, and Meta says it discovered the breach over a year...
Fifth Third Beats Back Impersonation Scams
Fifth Third reports a dramatic surge in bank‑impersonation scams, which now represent about 17% of its fraud cases and have tripled since 2024. Fraud leader Kristopher Edwards says scammers are spoofing caller IDs, hijacking search ads, and creating fake social‑media sites...

7 Ways to Boost the Privacy of Your Home and Gadgets
Privacy concerns are infiltrating everyday homes as smart devices collect more data than users realize. Experts advise treating gadgets as computers, disabling unused features, and favoring physical controls like camera shutters. Storing video locally rather than in the cloud reduces...

Governance Gaps Emerge as AI Agents Drive 76% Increase in NHIs
The SANS Institute’s 2026 State of Identity Threats & Defenses Survey reveals a 76 % rise in non‑human identities (NHIs) as AI agents proliferate across enterprises. Seventy‑four percent of firms already deploy AI agents that require credentials, causing NHIs to double...

Google Warns of New Campaign Targeting BPOs to Steal Corporate Data
Google’s Threat Intelligence Group has identified a financially motivated actor, tracked as UNC6783, launching a focused campaign against business process outsourcing firms to pilfer data from their high‑value corporate clients. The group uses live‑chat lures, spoofed Okta login pages and...

It’s Not Just Spyware Scandals: EU Is Funding the Industry that Spies on Europeans
In February 2026 a Greek court sentenced four people, including Intellexa executives, for the Predator spyware scandal that targeted journalists, politicians and business leaders. Investigations reveal that EU programmes such as the European Defence Fund, Horizon research, and the European...

AI Supercharges Scams as ASIC Hits Record Takedowns
Australia’s securities regulator ASIC dismantled a record 11,964 phishing and investment‑scam websites in 2025, a 90% jump from the 6,270 sites removed in 2024. The surge coincides with scammers exploiting artificial‑intelligence tools to craft more convincing fraud content. Despite the...

Signature Healthcare Cyberattack Causes Service Disruptions, Treatment Delays
Signature Healthcare detected a cyberattack on April 6, 2026, prompting the network to shift to emergency downtime procedures. The breach forced the Brockton Hospital to divert ambulances, cancel chemotherapy infusions, and rely on manual workflows, while surgeries and urgent care continued...

Use of Unauthorised AI Sparks Security and Compliance Concerns for Businesses
Two thirds of UK business leaders worry about data security and compliance risks from employees' unauthorised AI use, according to a Studio Graphene‑commissioned poll of 500 senior managers. The survey found 48% suspect shadow AI tools are in use, rising...
Patch Windows Collapse as Time-to-Exploit Accelerates
Rapid7’s 2026 Threat Landscape Report shows confirmed exploitation of high‑ and critical‑severity vulnerabilities more than doubled, rising to 146 incidents in 2025 from 71 in 2024. The median time from public disclosure to inclusion in CISA’s Known Exploited Vulnerabilities list...

Adobe Reader Zero-Day Exploited for Months: Researcher
A researcher has identified an actively exploited zero‑day vulnerability in Adobe Reader, discovered through a malicious PDF that can harvest system data and may enable remote code execution or sandbox escape. The exploit has been observed in the wild since...

Google Warns of New Threat Group Targeting BPOs and Helpdesks
Google’s Threat Intelligence Group has identified a new financially motivated threat cluster, UNC6783, targeting business process outsourcers and enterprise helpdesks. The group leverages live‑chat interactions to direct victims to spoofed Okta login pages and malicious Zendesk‑support domains, stealing clipboard data...

68% of Banks Increase Fraud Defense Spending as Account Takeovers Spike
Banks are rapidly reclassifying fraud defense from a reactive cost center to core infrastructure, driven by a surge in account‑takeover attacks. The PYMNTS 2025 State of Fraud report shows unauthorized‑party fraud now represents 71% of incidents and losses, pushing average...

CLEAR1 Achieves FedRAMP® ‘In Process’ Designation to Support Public Sector and Regulated Industries
CLEAR 1, the secure identity platform of CLEAR (NYSE: YOU), has earned a FedRAMP Moderate “In Process” designation and is now listed on the FedRAMP Marketplace. The milestone builds on CLEAR’s contract with CMS to modernize Medicare.gov identity verification and signals...

Vibe Coding Is the New Shadow IT
Generative AI has turned shadow IT into "vibe coding," where employees create applications using natural‑language prompts. While the approach accelerates prototyping and lets non‑developers build tools, the resulting code often lacks testing, security reviews, and documentation. Enterprises face rogue apps...

Quantum-Safe Email: S/MIME and Post-Quantum Email Security
The article warns that today’s S/MIME email encryption, built on RSA and ECC, will become vulnerable once practical quantum computers arrive. Quantum algorithms like Shor’s could crack RSA‑2048 in hours, exposing corporate contracts, financial data, and intellectual property. The U.S....

Bitcoin Depot Discloses $3.6 Million Crypto Theft Following System Breach
Bitcoin Depot disclosed that on March 23, 2026 attackers siphoned 50.903 Bitcoin, roughly $3.665 million, from its internal settlement wallets after breaching corporate IT systems. The breach was limited to internal credentials and did not affect customer‑facing platforms or data. Bitcoin...

Kenya’s Cyber Threats Surge 441% in Three Months as Defence Gap Widens
Kenya’s Computer Incident Response Centre reported a 441% jump in cyber threat events, reaching 4.6 billion incidents in the fourth quarter of 2025 – the sharpest rise in at least three years. Distributed Denial‑of‑Service attacks exploded by 1,117% quarter‑on‑quarter, yet advisory...

DRAM’s Whac‑A‑Mole Security Crisis
Rowhammer remains a pervasive DRAM security flaw, and a newer variant called Rowpress is emerging as a complementary threat. Memory manufacturers have introduced refresh‑management commands—RFM, ARFM and DRFM—to target vulnerable rows, yet these mitigations are imperfect and can be weaponized....

Why Incident Response Has Become a Core Responsibility for MSPs
Recent high‑profile cyber breaches in the UK have highlighted that many organizations are unprepared for the aftermath of an intrusion. While technical safeguards remain essential, customers now judge managed service providers (MSPs) on their ability to execute a robust incident...

Quantum Computers and Post-Quantum Security
Swiss financial infrastructure operator SIX is accelerating its shift to post‑quantum cryptography as quantum computers threaten current asymmetric encryption. The firm has launched a comprehensive crypto‑inventory, built crypto‑agility into its systems, and begun hybrid testing of NIST‑standardized PQC algorithms. By...

Your MCP Server Is a Resource Server Now. Act Like It.
The March 26 2025 revision of the MCP specification reclassifies MCP servers as OAuth 2.0 resource servers, demanding a formal identity layer. The article walks through building an identity gateway that uses Keycloak, Maverics, OPA policies, and RFC 8693 token‑exchange to give Claude‑style AI...

$3.6 Million Stolen in Bitcoin Depot Hack
Bitcoin Depot, the largest U.S. Bitcoin ATM operator, disclosed that hackers stole roughly 50.903 BTC, valued at about $3.6 million, after breaching its corporate IT systems on March 23. The company says the intrusion was limited to internal wallets and did not affect...
NCSC Warns of Russian Cyber Hijack Threat
The UK National Cyber Security Centre (NCSC) warned that Russian state‑linked group APT28 is hijacking popular routers such as TP‑Link and MikroTik to reroute internet traffic through malicious DNS servers. By compromising these devices, the group conducts man‑in‑the‑middle attacks that...

AI Agent Intent Is a Starting Point, Not a Security Strategy
Token Security’s research reveals that 65% of agentic chatbots retain live access credentials despite never being used, and 51% of their external actions depend on hard‑coded keys. The study highlights how AI agents are treated as disposable experiments, creating orphaned...

Asqav: Open-Source SDK for AI Agent Governance
Asqav is an open‑source Python SDK that cryptographically signs every autonomous AI agent action using the quantum‑safe ML‑DSA‑65 algorithm and links entries in a tamper‑evident hash chain. The toolkit integrates with five popular agent frameworks—including LangChain and OpenAI Agents—and offers...

Hong Kong Police Arrest Man Suspected of Stealing 56,000 Hospital Authority Patients’ Personal Data
Hong Kong police arrested a 30‑year‑old contractor employee suspected of downloading personal data of more than 56,000 Hospital Authority patients. The breach, traced to two contractor offices in the New Territories, involved surgical‑procedure details but not full medical records. Authorities...

Phishers Sneak Through Using GitHub and Jira’s Own Mail Delivery Infrastructure
Security researchers at Cisco Talos have uncovered a new phishing vector that hijacks the native notification systems of SaaS platforms such as GitHub and Atlassian Jira. By embedding malicious text in commit summaries or Jira project fields, attackers trigger automatic...

Prompt Injection Tags Along as GenAI Enters Daily Government Use
State and territorial governments are now using generative AI (GenAI) in everyday workflows, with 82% of CIOs reporting daily usage—a jump from 53% a year earlier. As adoption expands, the Center for Internet Security warns that prompt injection—malicious instructions hidden...

AusPost Warns of Growing Online Scam Threat
Australia Post warns that scams targeting sellers on online marketplaces have surged, with more than 2,500 reports this year. Fraudsters pose as buyers on platforms like Facebook Marketplace, sending fake QR codes or links that mimic Australia Post’s courier service...

Quantum-Secure Satellite Communications and the Future of Protected Networks
Quantum‑secure satellite communications are transitioning from concept to early service architecture, using quantum key distribution from orbit to protect high‑value links. Government programs such as ESA’s SAGA, the QKDSat‑Redwire partnership, and Canada’s QEYSSat illustrate strategic investment driven by sovereignty and...

Shaky Ceasefire Unlikely to Stop Cyberattacks From Iran-Linked Hackers for Long
A tentative cease‑fire between Iran, the United States and Israel is unlikely to halt cyber attacks from Iran‑linked groups. Pro‑Iranian hacktivist collective Handala announced it will pause attacks on U.S. targets but continue striking Israel, warning it will resume U.S....

Fake QR Codes Make for Easy Scams – Be Careful What You Scan Out There
QR codes have become ubiquitous for payments, menus, and transport, but their convenience also makes them a prime vector for scams. Cybercriminals employ "quishing"—QR‑based phishing—to redirect users to counterfeit login or payment sites, often by overlaying fake stickers on legitimate...

Russia's Forest Blizzard Nabs Rafts of Logins Via SOHO Routers
Russian GRU‑backed APT28, also known as Fancy Bear, has been exploiting long‑standing bugs in consumer‑grade SOHO routers such as MikroTik and TP‑Link to intercept web traffic worldwide. By reconfiguring DNS settings on compromised devices, the group silently siphons email credentials and...
Stateless Hash-Based Signatures for AI Model Weight Integrity
Enterprises deploying AI agents with Model Context Protocol (MCP) must test cryptographic safeguards in realistic cloud sandboxes. Simulating post‑quantum algorithms such as Kyber and Dilithium on high‑entropy instances reveals significant CPU and latency overhead, especially under heavy agent loads. Proper...