Cybersecurity News and Headlines

Behind the Mythos Hype, Glasswing Has Just One Confirmed CVE
NewsApr 16, 2026

Behind the Mythos Hype, Glasswing Has Just One Confirmed CVE

Anthropic’s Project Glasswing, the gated access program behind its Mythos AI, has produced only one publicly attributed CVE (CVE‑2026‑4747) according to VulnCheck’s analysis. While Anthropic researchers are credited with 40 CVEs overall, the majority stem from external collaborations rather than...

By CSO Online
Splunk Enterprise Update Patches Code Execution Vulnerability
NewsApr 16, 2026

Splunk Enterprise Update Patches Code Execution Vulnerability

Splunk released emergency patches for several critical flaws across its Enterprise, Cloud Platform, and MCP Server products. The most severe issue, CVE‑2026‑20204, allowed low‑privileged users to upload malicious files and achieve remote code execution due to improper handling of temporary...

By SecurityWeek
Overstretched NIST to Limit CVE Enrichments
NewsApr 16, 2026

Overstretched NIST to Limit CVE Enrichments

The U.S. National Institute of Standards and Technology (NIST) announced it will stop enriching every CVE entry in its National Vulnerability Database due to a surge in submissions. CVE submissions rose 263 % between 2020 and 2025, overwhelming NIST’s resources. Going...

By The Stack (TheStack.technology)
Standard Bank Data Breach Fallout Deepens
NewsApr 16, 2026

Standard Bank Data Breach Fallout Deepens

Standard Bank confirmed that data stolen in a March cyber‑attack has now been posted online, exposing client names, identification numbers, contact details and limited credit‑card information. The breach, attributed to a hacker using the handle “ROOTBOY,” involved a three‑week intrusion...

By TechCentral (South Africa)
French Minister Says New Measures Are Coming After Crypto Kidnappings
NewsApr 16, 2026

French Minister Says New Measures Are Coming After Crypto Kidnappings

French interior minister delegate Jean‑Didier Berger announced new measures to curb crypto kidnappings, known as wrench attacks, after a recent €400,000 ransom case. Authorities have launched a prevention platform that already has thousands of sign‑ups and are collaborating with Interior...

By Cointelegraph
AI Bots - a New Risk and Opportunity for CIOs to Manage
NewsApr 16, 2026

AI Bots - a New Risk and Opportunity for CIOs to Manage

AI‑generated bots are flooding corporate web estates, with Akamai reporting a 300% rise in AI‑driven traffic and some CIOs seeing a 400% jump in site crawls. The surge inflates API, cloud and CDN usage, driving up operating expenses and degrading...

By Diginomica
AI and Executive Protection: New Risks, New Defenses
NewsApr 16, 2026

AI and Executive Protection: New Risks, New Defenses

AI‑generated phishing attacks are now targeting corporate executives with hyper‑personalized emails crafted from public profiles and generative AI. The barrier to launch such campaigns has collapsed, allowing amateurs to produce convincing phishing kits and doxing databases. Security teams can counter...

By Security Boulevard
Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu
NewsApr 16, 2026

Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu

Reflectiz discovered that a Taboola tracking pixel approved in a bank’s CSP silently redirected logged‑in users to a Temu endpoint via a 302 response. The redirect included an Access‑Control‑Allow‑Credentials header, causing browsers to send authentication cookies to Temu and link...

By The Hacker News
Business Logic Flaws: The Silent Threat in Modern Web Applications
NewsApr 16, 2026

Business Logic Flaws: The Silent Threat in Modern Web Applications

In late 2019 Robinhood’s options platform mis‑calculated buying power, allowing users to control positions worth hundreds of thousands of dollars with only a few thousand in capital. The flaw stemmed from a business‑logic assumption that margin‑related trades reduced risk, which...

By Security Boulevard
Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks
NewsApr 16, 2026

Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks

Researchers at Elastic Security Labs identified a novel social‑engineering campaign that abuses Obsidian’s community plugins to deliver the previously unknown PHANTOMPULSE remote‑access trojan. Threat actors pose as venture‑capital contacts on LinkedIn and Telegram, coaxing finance and cryptocurrency professionals to enable...

By The Hacker News
Systemic Flaw in MCP Protocol Could Expose 150 Million Downloads
NewsApr 16, 2026

Systemic Flaw in MCP Protocol Could Expose 150 Million Downloads

Security researchers at Ox Security disclosed a critical, systemic flaw in Anthropic's Model Context Protocol (MCP) that enables arbitrary command execution. The vulnerability stems from the protocol’s STDIO interface, which runs commands even when server startup fails, exposing over 200...

By Infosecurity Magazine
CAIS
NewsApr 16, 2026

CAIS

HolistiCyber’s Cyber AI Suite (CAIS) is a comprehensive service that secures AI‑driven applications from architecture through governance. It begins with a deep review of Retrieval‑Augmented Generation (RAG) pipelines and vector databases, then applies threat modeling and AI‑focused penetration testing using...

By Security Boulevard
Inditex Data Breach: Zara Owner Inditex Reports Major Data Breach Exposing Customer Transaction Records
NewsApr 16, 2026

Inditex Data Breach: Zara Owner Inditex Reports Major Data Breach Exposing Customer Transaction Records

Inditex, the parent of Zara, disclosed a data breach that originated from a former technology provider and exposed transaction‑related information but no customer names, contact details, passwords, or payment data. The breach involved a third‑party service used by several international...

By Mint – Technology (India)
'Attention-Seeking' Man Allegedly Targeted Police, Defence in 'Cybercrime Spree'
NewsApr 16, 2026

'Attention-Seeking' Man Allegedly Targeted Police, Defence in 'Cybercrime Spree'

A 22‑year‑old Adelaide resident, Aiden Wood, was charged with 12 hacking offences after allegedly launching a four‑month cybercrime spree that targeted critical government infrastructure, including the Australian Federal Police and Defence Force, as well as the NBN network at a...

By ABC News (Australia) Health
Norway’s State Telecoms Firm Accused of Helping Myanmar Regime Seize Activists
NewsApr 16, 2026

Norway’s State Telecoms Firm Accused of Helping Myanmar Regime Seize Activists

A Norwegian state‑owned telecom, Telenor, faces a class‑action lawsuit in Norway alleging it supplied the Myanmar military with personal data on more than 1,200 activists, facilitating arrests and alleged torture. The suit, filed by the Justice and Accountability Initiative and...

By The Guardian
“I’m Just Scared”: Teen Hacker Jailed After Massive U.S. School Data Breach
NewsApr 16, 2026

“I’m Just Scared”: Teen Hacker Jailed After Massive U.S. School Data Breach

Teen hacker Matthew Lane, now 20, was sentenced to four years in federal prison for his central role in the PowerSchool data breach, one of the largest attacks on U.S. education. The breach exposed personal information for roughly 60 million students...

By The Cyber Express
Capsule Security Exits Stealth with $7m Seed Round
NewsApr 16, 2026

Capsule Security Exits Stealth with $7m Seed Round

Capsule Security emerged from stealth with a $7 million seed round co‑led by Lama Partners and Forgepoint Capital. The startup offers a runtime trust layer that monitors AI agents between prompt and action, aiming to stop manipulation, unexpected behavior, and data...

By Fintech Global
Automotive Ransomware Attacks Double in a Year
NewsApr 16, 2026

Automotive Ransomware Attacks Double in a Year

Ransomware has become the fastest‑growing cyber threat to the automotive industry, accounting for 44% of all attacks on carmakers in 2025. Halcyon’s report shows attack frequency more than doubled last year, driven by connected vehicle platforms, OTA updates and cloud‑based...

By Infosecurity Magazine
Claude Code, Gemini CLI, GitHub Copilot Agents Vulnerable to Prompt Injection via Comments
NewsApr 16, 2026

Claude Code, Gemini CLI, GitHub Copilot Agents Vulnerable to Prompt Injection via Comments

Security researchers disclosed a new prompt‑injection technique called “Comment and Control” that exploits AI‑driven code tools on GitHub. The method tricks Claude Code Security Review, Google Gemini CLI Action, and GitHub Copilot Agent by embedding malicious prompts in pull‑request titles, issue...

By SecurityWeek
US Nationals Behind DPRK IT Worker 'Laptop Farm' Sent to Prison
NewsApr 16, 2026

US Nationals Behind DPRK IT Worker 'Laptop Farm' Sent to Prison

Two U.S. nationals, Kejia Wang and Zhenxing Wang, were sentenced to 108 months and 92 months respectively for orchestrating a scheme that placed North Korean IT workers in over 100 American companies using stolen identities. Between 2021 and October 2024...

By BleepingComputer
Use of Agentic AI Erodes GDPR Compliance as We Know It. Wipro's 'Privacy by Design'  Comes Into Its Own
NewsApr 16, 2026

Use of Agentic AI Erodes GDPR Compliance as We Know It. Wipro's 'Privacy by Design' Comes Into Its Own

The rise of agentic AI—autonomous systems that decompose tasks, retain memory, and act on users’ behalf—exposes gaps in current GDPR compliance frameworks. Traditional governance assumes static tools, not self‑directing agents that make micro‑decisions, store contextual data, and can be hijacked...

By Diginomica
Microsoft: April Windows Server 2025 Update May Fail to Install
NewsApr 16, 2026

Microsoft: April Windows Server 2025 Update May Fail to Install

Microsoft is investigating a failure of the April 2026 KB5082063 security update on Windows Server 2025, which triggers error code 0x800F0983 and, in some cases, forces servers into BitLocker recovery mode. The issue appears limited to enterprise‑managed configurations and does not affect...

By BleepingComputer
One Year on From the M&S Cyber Attack: What Did We Learn?
NewsApr 16, 2026

One Year on From the M&S Cyber Attack: What Did We Learn?

One year after the Easter‑week 2025 Marks & Spencer cyber breach, analysts confirm the attack originated from a simple social‑engineering phone call that compromised a third‑party help‑desk and cascaded into ransomware across VMware hosts. The incident sparked a wave of...

By Computer Weekly – Latest IT news
Targeted Cyberattack on Northern Ireland Schools Exposes Personal Data
NewsApr 16, 2026

Targeted Cyberattack on Northern Ireland Schools Exposes Personal Data

A recent cyberattack on Northern Ireland's Education Authority was confirmed as a targeted breach affecting a small number of schools. Forensic analysis revealed that attackers accessed personal data, though no large‑scale exfiltration has been proven. Police Service of Northern Ireland...

By The Cyber Express
How to Implement Passwordless Authentication to Boost User Conversion
NewsApr 16, 2026

How to Implement Passwordless Authentication to Boost User Conversion

Passwordless authentication replaces passwords with device‑bound cryptographic keys, removing a major source of friction in sign‑up and login flows. The 2026 Passwordless Conversion Impact Report shows that faster entry boosts lifetime value, while the IBM Cost of Data Breach Report...

By Security Boulevard
Democratized Software, Democratized Risk: Who’s Accountable When Everyone Codes?
NewsApr 16, 2026

Democratized Software, Democratized Risk: Who’s Accountable When Everyone Codes?

AI‑driven coding tools are letting non‑technical teams create software without traditional developer resources, accelerating delivery and cutting costs. However, this democratization creates governance gaps that can expose organizations to security, compliance, and accountability risks. The article advises IT leaders to...

By Security Magazine (Cybersecurity)
Corporate Affairs Commission Hit by Cyberattack in Nigeria
NewsApr 16, 2026

Corporate Affairs Commission Hit by Cyberattack in Nigeria

Nigeria’s Corporate Affairs Commission confirmed a cyber‑attack that compromised its company‑registration platform, prompting an urgent investigation with the National Information Technology Development Agency. The breach threatens sensitive business data, could delay filings and erode confidence in government digital services. At...

By Techpoint Africa
Shadow AI and the New Visibility Gap in Software Development
NewsApr 16, 2026

Shadow AI and the New Visibility Gap in Software Development

Generative AI is now a core part of software development, but shadow AI—unapproved AI tools used by developers—is already mainstream, with 50% of workers globally and over 70% of UK employees relying on them. This creates a "lethal trifecta" of...

By ITPro (UK)
MiningDropper Turns Android Apps Into Multi-Stage Malware Delivery Systems
NewsApr 16, 2026

MiningDropper Turns Android Apps Into Multi-Stage Malware Delivery Systems

Researchers at Cyble have identified a surge in Android malware campaigns leveraging a new modular framework called MiningDropper. The platform repurposes the open‑source Lumolight app as a trojanized entry point and uses layered XOR and AES encryption to deliver multi‑stage...

By The Cyber Express
6-Year Ransomware Campaign Targets Turkish Homes & SMBs
NewsApr 16, 2026

6-Year Ransomware Campaign Targets Turkish Homes & SMBs

Researchers at Acronis have identified a low‑dollar, high‑volume ransomware operation that has been active in Turkey since at least 2020. The attackers deploy a customized Adwind RAT to deliver the JanaWare ransomware, demanding between $200 and $400 per victim. The...

By Dark Reading
Web Supply Chain Risk in ANZ: Why the Browser Is the New Front Line
NewsApr 16, 2026

Web Supply Chain Risk in ANZ: Why the Browser Is the New Front Line

Reflectiz warns that modern web applications increasingly rely on third‑ and fourth‑party scripts that execute in users' browsers, creating a hidden supply‑chain risk that traditional security tools cannot see. Research of 4,700 ANZ sites shows 64% of these scripts handle...

By Security Boulevard
Cyberwar’s New Frontier
NewsApr 16, 2026

Cyberwar’s New Frontier

The article warns that autonomous cyber‑agents are moving from theory to operational reality, capable of launching attacks in minutes and persisting undetected across critical sectors. It highlights the U.S. 2026 Cyber Strategy’s embrace of such agents while noting severe staffing...

By Foreign Affairs
RedSun: System User Access on Win 11/10 and Server with the April 2026 Update
NewsApr 16, 2026

RedSun: System User Access on Win 11/10 and Server with the April 2026 Update

RedSun is a newly disclosed vulnerability affecting Windows 10, Windows 11 and Windows Server with the April 2026 Update. The flaw exploits Windows Defender’s cloud‑tag handling, causing the antivirus to rewrite a malicious file back to its original location. By overwriting trusted system...

By Hacker News
FSF Trying to Contact Google About Spammer Sending 10k+ Mails From Gmail Account
NewsApr 16, 2026

FSF Trying to Contact Google About Spammer Sending 10k+ Mails From Gmail Account

Thom Zane, an administrator of the daedal.io Mastodon instance, posted on the fediverse asking for a direct email address to reach a human on Google’s Gmail team. He wants to report a spammer who allegedly sent more than 10,000 Gmail...

By Hacker News
Taking Operational Risk to Resilience with Emerging AI Systems: Gartner
NewsApr 16, 2026

Taking Operational Risk to Resilience with Emerging AI Systems: Gartner

Gartner warns that generative AI (GenAI) and agentic AI are exposing enterprises to rising security incidents. It predicts 25% of GenAI applications will suffer at least five minor incidents annually by 2028, and 15% will encounter a major breach by...

By ARN (Australia)
Spatiotemporal Light Pulses Could Secure Optical Communication by Masking Data
NewsApr 16, 2026

Spatiotemporal Light Pulses Could Secure Optical Communication by Masking Data

Ben‑Gurion University researchers have devised a secure optical‑communication scheme that embeds data within spatiotemporal optical vortices—light pulses whose structure conceals information from conventional detectors. The approach pairs these shaped pulses with a pre‑shared key and decoy‑signal algorithm, allowing only a...

By Phys.org (Quantum Physics News)
Coremail Showcases at GITEX Asia 2026: Advancing Enterprise Communication with AI-Native Secure Email
NewsApr 15, 2026

Coremail Showcases at GITEX Asia 2026: Advancing Enterprise Communication with AI-Native Secure Email

Coremail unveiled its AI‑Native Secure Email System and CACTER AI‑Native Secure Email Gateway at GITEX Asia 2026 in Singapore. The solutions combine large language models with autonomous agents to transform email from a static messaging tool into a task‑execution hub....

By The Manila Times – Business
Anonymizing Network Traffic: A Dive Into SOCKS5 and Data Encryption
NewsApr 15, 2026

Anonymizing Network Traffic: A Dive Into SOCKS5 and Data Encryption

SOCKS5 proxies have become a core tool for businesses that need to hide IP addresses while handling any traffic type, from HTTP to UDP. Unlike HTTP proxies, SOCKS5 does not inspect data, allowing seamless use for streaming, automated data collection,...

By HackRead
Over 25K Systems Exposed by Adware App to Supply Chain Compromise
NewsApr 15, 2026

Over 25K Systems Exposed by Adware App to Supply Chain Compromise

Dragon Boss Solutions’ ad‑ware platform inadvertently exposed more than 25,000 systems after an insecure software‑update channel was discovered. Threat actors could purchase a signed payload for about $10 and push malicious code with SYSTEM privileges. Huntress identified communications from 23,565 IP addresses,...

By SC Media
To Fight Ransomware, Turn to Incident Response Professionals
NewsApr 15, 2026

To Fight Ransomware, Turn to Incident Response Professionals

The UK Home Office is consulting on a ban on ransomware payments for public‑sector bodies and critical national infrastructure, alongside a broader payment‑prevention regime and mandatory incident‑reporting. Critics argue the proposal could leave under‑resourced firms tangled in legal hoops while...

By RUSI
WBA Guidelines Target Rogue Access Points and Credential Theft
NewsApr 15, 2026

WBA Guidelines Target Rogue Access Points and Credential Theft

The Wireless Broadband Alliance (WBA) released a Wi‑Fi Security Guidelines framework to standardize protection across public, enterprise, IoT, and roaming networks. The document mandates mutual certificate‑based authentication, WPA3‑Enterprise with Protected Management Frames, and encrypted RADIUS traffic to thwart rogue access...

By SC Media
KnowBe4 Debuts Guardrails for Autonomous AI Agents
NewsApr 15, 2026

KnowBe4 Debuts Guardrails for Autonomous AI Agents

KnowBe4 has introduced Agent Risk Manager, a real‑time monitoring and governance layer designed to police autonomous AI agents operating across enterprise environments. The solution adds behavioral guardrails to block threats such as unauthorized data exposure, prompt‑injection jailbreaks, and runaway compute...

By SC Media
CoSN 2026: Student-Led Cyber Programs Incentivize Culture of Safety
NewsApr 15, 2026

CoSN 2026: Student-Led Cyber Programs Incentivize Culture of Safety

At DeKalb County School District, the second‑year Cyber Champions program places students at the forefront of district‑wide cybersecurity education, turning them into peer advocates for digital safety, phishing awareness, and AI ethics. The initiative operates without a dedicated budget, leveraging...

By GovTech — Education (K-12)
Securing Remote Server Access: Why VPNs Matter for Administrators
NewsApr 15, 2026

Securing Remote Server Access: Why VPNs Matter for Administrators

Remote server administrators face brute‑force, phishing and malware attacks when SSH or RDP are exposed to the internet. Deploying a corporate VPN tunnels remote connections through encrypted channels, limiting access to authenticated users and removing direct exposure of critical ports....

By HackRead
Anthropic's Mythos Triggers Cybersecurity Race — CrowdStrike, Rubrik, Cloudflare Stand To Gain
NewsApr 15, 2026

Anthropic's Mythos Triggers Cybersecurity Race — CrowdStrike, Rubrik, Cloudflare Stand To Gain

Anthropic unveiled Project Glasswing and the Claude Mythos model, an AI system that can autonomously discover and exploit software vulnerabilities at scale. ARK Invest highlighted Mythos' 93.9% SWE‑bench and 83.1% CyberGym scores as evidence of a new era in software...

By Yahoo Finance – Top Financial News
New AgingFly Malware Used in Attacks on Ukraine Govt, Hospitals
NewsApr 15, 2026

New AgingFly Malware Used in Attacks on Ukraine Govt, Hospitals

CERT‑UA uncovered a new malware family called AgingFly targeting Ukrainian government agencies, hospitals and possibly Defense Forces. The campaign begins with phishing emails offering humanitarian aid, leading victims to click links that deliver malicious LNK shortcuts and HTA files. Once...

By BleepingComputer
Critical MCP Integration Flaw Puts NGINX at Risk
NewsApr 15, 2026

Critical MCP Integration Flaw Puts NGINX at Risk

Researchers at Pluto Security have uncovered a critical vulnerability in the popular nginx‑ui web console, identified as CVE‑2026‑33032 with a CVSS score of 9.8. The flaw resides in the MCP /message endpoint, which performs no authentication and can be exploited to...

By Dark Reading
Class Action Targets Berkadia over Alleged Cyberattack Exposing Thousands' Data
NewsApr 15, 2026

Class Action Targets Berkadia over Alleged Cyberattack Exposing Thousands' Data

Berkadia Commercial Mortgage, the leading Freddie Mac lender, faces a proposed class action alleging a March 20 cyberattack by the ShinyHunters group. The breach reportedly exposed thousands of individuals' personal and financial data, including Social Security numbers and banking details. Plaintiffs claim...

By Mortgage Professional America
Android Phones Aren’t at Risk of Long-Standing iPhone Tap-to-Pay Vulnerability [Video]
NewsApr 15, 2026

Android Phones Aren’t at Risk of Long-Standing iPhone Tap-to-Pay Vulnerability [Video]

A five‑year‑old tap‑to‑pay flaw in iPhone’s Express mode lets large transit purchases bypass the lock screen, a vulnerability highlighted in a recent Veritasium video. Apple and Visa have been aware of the issue since 2021, but claim it falls under...

By 9to5Google