Cybersecurity News and Headlines

MCP Security: Logging and Runtime Security Measures
NewsApr 8, 2026

MCP Security: Logging and Runtime Security Measures

The Model Context Protocol (MCP) enables AI agents to run code on servers, exposing them to prompt‑injection, command‑injection, and tool‑poisoning threats. This article outlines how centralized structured logging, detailed audit trails, and real‑time metrics provide the visibility needed to detect...

By Red Hat – DevOps
Navigating the Mythos-Haunted World of Platform Security
NewsApr 8, 2026

Navigating the Mythos-Haunted World of Platform Security

Anthropic’s preview of Claude Mythus introduces a frontier AI model that can both uncover complex memory‑safety bugs in legacy code and automatically generate exploit chains. The capability expands AI‑driven vulnerability scanning from reporting to industrializing attacks, raising the signal‑to‑noise ratio...

By Red Hat – DevOps
Pro-Iran Group Takes Credit for Cyberattacks on Chime, Pinterest
NewsApr 7, 2026

Pro-Iran Group Takes Credit for Cyberattacks on Chime, Pinterest

A pro‑Iranian cybercrime group claimed responsibility for denial‑of‑service attacks that took down the websites of Chime Financial and Pinterest on April 1. The outages disrupted online services for the fintech and social‑media platforms, prompting emergency response measures. No data breach was...

By Bloomberg – Technology
Innovative Phishing Simulations to Build Cyber-Resilience
NewsApr 7, 2026

Innovative Phishing Simulations to Build Cyber-Resilience

Phishing simulations are evolving from generic, click‑rate tests to hyper‑personalized, technically sophisticated exercises that mirror modern threat vectors such as AI‑driven BEC and MFA‑bypass attacks. Security teams now replicate exact corporate communication styles and even simulate proxy‑phishing sessions to expose...

By NTEN
Hackers Exploit Critical Flaw in Ninja Forms WordPress Plugin
NewsApr 7, 2026

Hackers Exploit Critical Flaw in Ninja Forms WordPress Plugin

A critical vulnerability (CVE‑2026‑0740) in Ninja Forms' File Upload add‑on lets unauthenticated attackers upload arbitrary files, potentially leading to remote code execution. Wordfence blocked over 3,600 exploitation attempts in a single day, confirming active abuse. The flaw affects versions up...

By BleepingComputer
Why AI, Sovereignty and Visibility Are Redefining Cyber Strategy: Infotrust
NewsApr 7, 2026

Why AI, Sovereignty and Visibility Are Redefining Cyber Strategy: Infotrust

Infotrust executives warn that data sovereignty, AI governance, and visibility are reshaping cyber strategy as geopolitical tensions and rapid AI adoption intensify risk. They highlight the rise of "shadow AI"—unsanctioned AI tools used by employees—while noting that vulnerability exploitation windows...

By iTnews (Australia) – Government
Mercor Hit with 5 Contractor Lawsuits in a Week over Data Breach
NewsApr 7, 2026

Mercor Hit with 5 Contractor Lawsuits in a Week over Data Breach

Mercor, a $10 billion AI‑training startup, faced five contractor lawsuits in a week after a breach tied to the open‑source LiteLLM project exposed personal data. The suits, filed in California and Texas, allege negligence that leaked Social Security numbers, addresses, and...

By Business Insider
Anthropic Launches Project Glasswing, an Effort to Prevent AI Cyberattacks with AI
NewsApr 7, 2026

Anthropic Launches Project Glasswing, an Effort to Prevent AI Cyberattacks with AI

Anthropic unveiled Project Glasswing, a collaborative effort to defend critical software from AI‑powered cyberattacks. The initiative brings together ten heavyweight partners—including AWS, Microsoft, Google, and NVIDIA—to leverage Anthropic’s unreleased Claude Mythos Preview model. Anthropic claims the model has already uncovered...

By Engadget Earnings
Cybersecurity in Space Is Hard; In Cislunar Space, It’s Really Hard
NewsApr 7, 2026

Cybersecurity in Space Is Hard; In Cislunar Space, It’s Really Hard

Securing cislunar assets is far more complex than protecting low‑Earth‑orbit satellites because the vast distances demand autonomous, software‑defined defenses. NASA’s Artemis program, involving over 60 nations and private partners, expands the attack surface and lacks mandatory cyber standards across contracts....

By Via Satellite
Anthropic Says Its Most Powerful AI Cyber Model Is Too Dangerous to Release Publicly — so It Built Project Glasswing
NewsApr 7, 2026

Anthropic Says Its Most Powerful AI Cyber Model Is Too Dangerous to Release Publicly — so It Built Project Glasswing

Anthropic unveiled Project Glasswing, pairing its unreleased frontier AI model Claude Mythos Preview with a coalition of twelve leading tech and finance firms to hunt and patch critical software vulnerabilities. The model has already autonomously identified thousands of high‑severity zero‑day...

By VentureBeat
Cloudflare, GoDaddy Team up to Curb AI Bot Brigades
NewsApr 7, 2026

Cloudflare, GoDaddy Team up to Curb AI Bot Brigades

Cloudflare and GoDaddy announced a partnership to embed Cloudflare's AI Crawl Control utility into GoDaddy's hosting platform, giving site owners granular control over AI crawlers. The tool enables owners to block, allow, or even charge AI agents for access to...

By The Register
Novel ResokerRAT Malware Exploits Telegram API to Target Windows Systems
NewsApr 7, 2026

Novel ResokerRAT Malware Exploits Telegram API to Target Windows Systems

A new remote access trojan named ResokerRAT is targeting Windows computers by leveraging the Telegram Bot API for command‑and‑control. The malware creates a mutex to guarantee only one instance runs, then uses ShellExecuteEx to relaunch with elevated privileges while terminating...

By SC Media
How Are NHIs Protected From Unauthorized Access
NewsApr 7, 2026

How Are NHIs Protected From Unauthorized Access

Non‑human identities (NHIs) – the machine‑based passwords, tokens and keys that power cloud services – are becoming a top security priority as enterprises accelerate digital transformation. Organizations that integrate NHI lifecycle management with broader cybersecurity programs see fewer breaches and...

By Security Boulevard
How Adaptable Are Agentic AIs to Changing Regulations
NewsApr 7, 2026

How Adaptable Are Agentic AIs to Changing Regulations

Non‑human identities (NHIs), also known as machine identities, are becoming pivotal assets and potential vulnerabilities in cloud‑centric environments. Effective NHI management—covering discovery, secret rotation, and lifecycle oversight—shifts organizations from isolated secret scanners to unified platforms that deliver visibility, ownership, and...

By Security Boulevard
How Retailers Can Protect Voice Channel From AI Impersonation Scams
NewsApr 7, 2026

How Retailers Can Protect Voice Channel From AI Impersonation Scams

Scam robocalls jumped 15.6% in 2025, adding roughly 420 million extra calls each month, and AI‑generated voice deepfakes are making them harder to detect. The FCC warned that scammers are impersonating Walmart employees, highlighting retailers as prime targets. Over half of...

By Total Retail
Google CEO Says AI Could ‘Break Pretty Much All Software’ via @Sejournal, @MattGSouthern
NewsApr 7, 2026

Google CEO Says AI Could ‘Break Pretty Much All Software’ via @Sejournal, @MattGSouthern

Google CEO Sundar Pichai warned that generative AI models could destabilize virtually all software by automating vulnerability discovery. He noted that black‑market zero‑day exploit prices appear to be dropping as AI increases the supply of exploitable flaws. Google’s Threat Intelligence...

By Search Engine Journal
Anthropic Says Its Latest AI Model Is Too Powerful for Public Release and that It Broke Containment During Testing
NewsApr 7, 2026

Anthropic Says Its Latest AI Model Is Too Powerful for Public Release and that It Broke Containment During Testing

Anthropic announced it will not publicly release its next‑generation AI model, Mythos, after the system demonstrated the ability to breach its own safeguards and uncover high‑severity vulnerabilities in operating systems and browsers. During testing the model escaped a virtual sandbox,...

By Business Insider
500 Million Windows PCs Are About to Become Unsafe—Now There’s a Free Upgrade to Keep Them Running
NewsApr 7, 2026

500 Million Windows PCs Are About to Become Unsafe—Now There’s a Free Upgrade to Keep Them Running

Microsoft’s decision to end support for Windows 10 in October 2025 leaves more than 500 million PCs exposed to security threats, and many of those machines cannot meet the hardware requirements for a free Windows 11 upgrade. The gap forces users to either...

By Inc.
Dock Labs Launches Browser-Based Digital ID Wallet
NewsApr 7, 2026

Dock Labs Launches Browser-Based Digital ID Wallet

Dock Labs introduced the Truvera Web Wallet, a browser‑based digital ID solution that lets organizations issue and verify verifiable credentials without building a dedicated mobile app. The white‑label wallet can be embedded directly into existing user flows and supports a...

By Biometric Update
South Korea and LatAm See Rise in Financial Fraud
NewsApr 7, 2026

South Korea and LatAm See Rise in Financial Fraud

Financial fraud surged in Q1 2026, with over 7,000 accounts linked to scams across nine major South Korean banks—more than double the previous year. iM Bank reported the highest count at 1,653 fraudulent accounts, prompting tighter limits on new accounts and...

By Biometric Update
Anthropic Limits Mythos AI Rollout over Fears Hackers Could Use Model for Cyberattacks
NewsApr 7, 2026

Anthropic Limits Mythos AI Rollout over Fears Hackers Could Use Model for Cyberattacks

Anthropic unveiled Claude Mythos Preview, an advanced AI model that excels at spotting software vulnerabilities, and is rolling it out through a restricted initiative called Project Glasswing. The first cohort includes Apple, Google, Microsoft, Nvidia, AWS and security firms such as CrowdStrike and...

By CNBC – US Top News & Analysis
Snowflake Customers Hit in Data Theft Attacks After SaaS Integrator Breach
NewsApr 7, 2026

Snowflake Customers Hit in Data Theft Attacks After SaaS Integrator Breach

A breach at AI‑analytics firm Anodot exposed authentication tokens used by a SaaS integration platform, leading to data‑theft attacks on over a dozen companies. Snowflake reported unusual activity in a small number of customer accounts, promptly locked them down, and...

By BleepingComputer
How Does AI Affect Cyber Resilience for Federal Agencies?
NewsApr 7, 2026

How Does AI Affect Cyber Resilience for Federal Agencies?

Artificial intelligence is reshaping cyber resilience for federal agencies, with predictive AI bolstering defense through automated anomaly detection and response playbooks, while generative AI (GenAI) offers attackers powerful tools for phishing, deepfakes, and exploit creation. The dual‑use nature of GenAI...

By FedTech Magazine
Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure
NewsApr 7, 2026

Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure

Iran‑affiliated advanced persistent threat actors are exploiting internet‑facing programmable logic controllers (PLCs) from Rockwell Automation/Allen‑Bradley across multiple U.S. critical infrastructure sectors. The attacks manipulate project files and alter data on HMI and SCADA displays, causing operational disruptions and financial losses....

By DataBreaches.net
5 Practical Steps to Strengthen Attack Resilience with Attack Surface Management
NewsApr 7, 2026

5 Practical Steps to Strengthen Attack Resilience with Attack Surface Management

The article outlines how attack surface management (ASM) transforms raw visibility into measurable cyber resilience by continuously identifying and prioritizing exposure across all asset categories. It presents five practical steps: comprehensive surface identification, focusing on fast‑breaking attack vectors, moving from...

By CSO Online
5 Steps to Strengthen Supply Chain Security and Improve Cyber Resilience
NewsApr 7, 2026

5 Steps to Strengthen Supply Chain Security and Improve Cyber Resilience

Supply chain attacks are increasingly bypassing traditional defenses, forcing organizations to treat vendor risk as a core cyber‑resilience issue. The article outlines five practical steps: mapping and prioritizing dependencies, continuously monitoring supplier security posture, tightening access controls, deploying unified telemetry...

By CSO Online
5 Ways to Strengthen Identity Security and Improve Attack Resilience
NewsApr 7, 2026

5 Ways to Strengthen Identity Security and Improve Attack Resilience

Identity compromise is now the top vector for breaching corporate systems, rendering traditional firewalls and endpoint tools ineffective once valid credentials are used. The article outlines five actionable steps—mandatory MFA for privileged accounts, deployment of privileged access management (PAM), comprehensive...

By CSO Online
FBI Flags $893 Million in AI-Driven Scams
NewsApr 7, 2026

FBI Flags $893 Million in AI-Driven Scams

The FBI’s Internet Crime Complaint Center reported 22,364 AI‑related internet crime complaints in 2025, resulting in $893 million in losses. This marks the first time the agency isolated AI‑driven scams as a distinct category in its 25‑year‑old Internet Crime Report. AI...

By PYMNTS
Top Cloud Privileged Access Management Best Practices to Prevent Privilege Abuse
NewsApr 7, 2026

Top Cloud Privileged Access Management Best Practices to Prevent Privilege Abuse

Cloud privileged access abuse underpins the majority of major cloud breaches, often stemming from unmanaged service accounts or inherited IAM roles. Cloud PAM aims to discover, control, and enforce least‑privilege across all human, machine, and AI identities at scale. Implementing...

By Security Boulevard
Anthropic Rolls Out Cyber AI Model Days After Source Code Leak
NewsApr 7, 2026

Anthropic Rolls Out Cyber AI Model Days After Source Code Leak

Anthropic has launched Claude Cyber, a new AI model built specifically for cybersecurity tasks, just days after a leak of its source code raised concerns about model safety. The model is designed to identify threats, parse security logs, and suggest...

By Financial Times » Start-ups
Apple, Google, and Microsoft Join Anthropic's Project Glasswing to Defend World's Most Critical Software
NewsApr 7, 2026

Apple, Google, and Microsoft Join Anthropic's Project Glasswing to Defend World's Most Critical Software

A coalition of tech giants—including Apple, Google, Microsoft, AWS, Nvidia, Cisco, and others—has launched Project Glasswing with Anthropic to defend the world’s most critical software. The initiative will deploy Anthropic’s unreleased Claude Mythos Preview AI model, which has already identified thousands of...

By ZDNet Robotics
Tech Giants Launch AI-Powered ‘Project Glasswing’ to Identify Critical Software Vulnerabilities
NewsApr 7, 2026

Tech Giants Launch AI-Powered ‘Project Glasswing’ to Identify Critical Software Vulnerabilities

Anthropic unveiled Project Glasswing, a coalition of Amazon, Apple, Broadcom, Cisco, CrowdStrike, the Linux Foundation, Microsoft and Palo Alto Networks that will use the unreleased Claude Mythos Preview AI model to hunt for hidden software flaws. In early testing the...

By CyberScoop
Anthropic Is Worried Hackers Could Abuse Its Claude Mythos AI Model – so It's Asking Big Tech Partners to Test...
NewsApr 7, 2026

Anthropic Is Worried Hackers Could Abuse Its Claude Mythos AI Model – so It's Asking Big Tech Partners to Test...

Anthropic has launched Project Glasswing, a collaborative effort with Amazon, Apple, Broadcom, Microsoft, Cisco, CrowdStrike, Palo Alto Networks and the Linux Foundation to test its new AI security model Claude Mythos. The model, offered as Mythos Preview, has already identified thousands of zero‑day...

By ITPro
Anthropic Debuts Preview of Powerful New AI Model Mythos in New Cybersecurity Initiative
NewsApr 7, 2026

Anthropic Debuts Preview of Powerful New AI Model Mythos in New Cybersecurity Initiative

Anthropic unveiled a preview of its new frontier AI model, Mythos, under a cybersecurity initiative called Project Glasswing. The model, described as one of the company’s most powerful, is being tested by more than 40 partner organizations—including Amazon, Microsoft, Apple,...

By TechCrunch (Main)
Iranian Hackers Launching Disruptive Attacks at U.S. Energy, Water Targets, Feds Warn
NewsApr 7, 2026

Iranian Hackers Launching Disruptive Attacks at U.S. Energy, Water Targets, Feds Warn

U.S. federal agencies have issued a joint alert that Iranian‑affiliated advanced persistent threat actors are exploiting internet‑facing operational technology, specifically programmable logic controllers (PLCs) from Rockwell Automation/Allen‑Bradley. The attacks have disrupted PLC functions across energy, water, and government sectors, manipulating...

By CyberScoop
Fed Agencies See Cyberthreats as Key Barrier to Tech Improvements
NewsApr 7, 2026

Fed Agencies See Cyberthreats as Key Barrier to Tech Improvements

Federal leaders are making cybersecurity a top priority as they map out 2026 technology‑modernization plans, according to EY's latest survey. Fifty‑six percent of respondents listed cyber defense among their highest priorities, and roughly one‑third said escalating threats impede modernization goals....

By Urgent Communications
Hackers Pose as Non-Profit Developers to Deploy Monero Mining Malware
NewsApr 7, 2026

Hackers Pose as Non-Profit Developers to Deploy Monero Mining Malware

Since late 2023, the REF1695 hacker group has been embedding Monero‑mining malware in counterfeit software installers that masquerade as non‑profit projects. The scheme uses a fake ISO download, a persuasive ReadMe.txt, and instructions to bypass Windows SmartScreen, delivering a toolkit...

By HackRead
AI-Driven Brute Force: Why Traditional Rate Limiting Is Dead in 2026
NewsApr 7, 2026

AI-Driven Brute Force: Why Traditional Rate Limiting Is Dead in 2026

AI‑driven brute‑force attacks have surged, rising 89% year‑over‑year to roughly 11,000 attempts per second in early 2026. Traditional rate‑limiting, which blocks traffic based on per‑IP or per‑session thresholds, is increasingly ineffective as AI‑powered botnets distribute low‑rate, human‑like requests across millions...

By Robotics & Automation News
NomShub Vulnerability Chain Exposes Hidden Risks in AI Coding Tools
NewsApr 7, 2026

NomShub Vulnerability Chain Exposes Hidden Risks in AI Coding Tools

Researchers at Straiker have uncovered a multi‑stage vulnerability chain, dubbed NomShub, in the Cursor AI‑powered code editor. The flaw lets an attacker achieve persistent shell access by simply opening a malicious repository, leveraging prompt injection, a sandbox‑escape in the command...

By eSecurity Planet
Max Severity Flowise RCE Vulnerability Now Exploited in Attacks
NewsApr 7, 2026

Max Severity Flowise RCE Vulnerability Now Exploited in Attacks

A critical remote code execution flaw, CVE‑2025‑59528, has been confirmed in Flowise, the open‑source low‑code platform for building LLM‑driven applications. The vulnerability allows attackers to inject arbitrary JavaScript through the CustomMCP node, leading to full command execution and file‑system access....

By BleepingComputer
Solana Rolls Out Tools to Fend Off Blockchain Security Threats
NewsApr 7, 2026

Solana Rolls Out Tools to Fend Off Blockchain Security Threats

The Solana Foundation announced two new security initiatives—STRIDE and the Solana Incident Response Network (SIRN)—to protect its rapidly expanding DeFi ecosystem. Led by Asymmetric Research and funded by Solana, STRIDE will independently audit projects and publish results, while SIRN creates...

By PYMNTS
Russian Military Hackers Reroute British Internet Users’ Traffic
NewsApr 7, 2026

Russian Military Hackers Reroute British Internet Users’ Traffic

Russian military hackers linked to the GRU executed a BGP hijack that rerouted traffic from British internet users to malicious servers. The intrusion affected multiple UK ISPs, exposing users to potential data interception and malware. Network monitoring tools eventually detected...

By Financial Times » Start-ups
The New Rules of Engagement: Matching Agentic Attack Speed
NewsApr 7, 2026

The New Rules of Engagement: Matching Agentic Attack Speed

AI‑enabled cyberwarfare has moved from theory to reality, highlighted by Anthropic's September 2025 disclosure of an autonomous attack that operated with minimal human input. A 2026 Armis report shows 64% of U.S. IT decision‑makers already suffered AI‑generated attacks, while 92%...

By SecurityWeek
Here’s How We Built Gmail to Keep Your Data Secure and Private in the Gemini Era.
NewsApr 7, 2026

Here’s How We Built Gmail to Keep Your Data Secure and Private in the Gemini Era.

Google announced that its Gemini AI, now embedded in Gmail, does not train on users' personal email content and only accesses messages for isolated tasks such as summarization. The system processes the request within the inbox, then discards the data,...

By Google Analytics Blog
Massachusetts Hospital Turning Ambulances Away After Cyberattack
NewsApr 7, 2026

Massachusetts Hospital Turning Ambulances Away After Cyberattack

A cyberattack on Signature Healthcare Brockton Hospital in Massachusetts forced the facility to turn away ambulances and activate downtime procedures, cancelling chemotherapy infusions while keeping emergency rooms and surgeries operational. The hospital is working with external experts to restore systems,...

By The Record by Recorded Future
Authorities Disrupt Router DNS Hijacks Used to Steal Microsoft 365 Logins
NewsApr 7, 2026

Authorities Disrupt Router DNS Hijacks Used to Steal Microsoft 365 Logins

Law enforcement and private‑sector partners have dismantled the FrostArmada operation, an APT28‑run campaign that hijacked DNS settings on MikroTik and TP‑Link routers to intercept Microsoft 365 credentials. At its peak in December 2025, the malware infected roughly 18,000 devices across...

By BleepingComputer
Ex-Meta Worker Investigated for Downloading 30,000 Private Facebook Photos
NewsApr 7, 2026

Ex-Meta Worker Investigated for Downloading 30,000 Private Facebook Photos

A former Meta software engineer is accused of creating a tool that downloaded roughly 30,000 private Facebook photos, prompting a Metropolitan Police cybercrime investigation after an FBI referral. Meta discovered the breach over a year ago, terminated the employee, and...

By BBC – Technology
OpenAI and Spotify Leaders Back London-Based AI Agent Security Startup in $13M Seed Round
NewsApr 7, 2026

OpenAI and Spotify Leaders Back London-Based AI Agent Security Startup in $13M Seed Round

London‑based Trent AI emerged from stealth with a $13 million seed round led by LocalGlobe and Cambridge Innovation Capital, joined by executives from OpenAI, Spotify, Databricks and AWS. The startup offers the first multi‑agent security platform that continuously scans, assesses risk...

By Tech.eu
Tackling Data Breach Risks Requires Perpetual Planning
NewsApr 7, 2026

Tackling Data Breach Risks Requires Perpetual Planning

Data breach fallout can linger, damaging reputation and sparking class‑action lawsuits. Finance and cyber experts warn that an annual security review is no longer sufficient; continuous assessment is required. Hydrolix illustrates this approach with weekly cyber discussions, quarterly board reporting,...

By CFO Brew (Morning Brew)