Cybersecurity News and Headlines

The Myth of the CMMC “Easy Button:” Why Shortcuts Usually Collapse Under Scrutiny From a Third-Party Assessor
NewsApr 15, 2026

The Myth of the CMMC “Easy Button:” Why Shortcuts Usually Collapse Under Scrutiny From a Third-Party Assessor

Defense contractors face intense pressure to meet CMMC Level 2 requirements on compressed timelines, turning what was once a planning exercise into a contractual mandate. The article warns that shortcuts—such as relying on shared multi‑tenant environments or skipping a proven reference...

By Federal News Network
The Transparency Tax: The Cost of Not Knowing What’s in Your Software
NewsApr 15, 2026

The Transparency Tax: The Cost of Not Knowing What’s in Your Software

The article introduces the "transparency tax," the hidden operational cost organizations incur when they lack continuous visibility into the components of their software. It cites past supply‑chain attacks—such as Log4Shell, which averaged over $90,000 in incident‑response costs—to illustrate how manual...

By Federal News Network
Maine Rejects Broad Privacy Bill
NewsApr 15, 2026

Maine Rejects Broad Privacy Bill

Maine lawmakers rejected the Maine Online Data Privacy Act (LD 1822), a sweeping proposal that would have restricted data collection, mandated opt‑outs for behaviorally targeted advertising, and banned the sale of sensitive information such as biometric, genetic, and race data. The...

By MediaPost
How AI Hackers Will Shake up Cyber-Security
NewsApr 15, 2026

How AI Hackers Will Shake up Cyber-Security

Anthropic announced its newest AI model, Mythos, will not be publicly released. Instead, access is limited to the 12 founding members of Project Glasswing, a consortium that includes Apple, Google and Nvidia. The move reflects growing concerns that advanced generative...

By The Economist – Science & Technology
NIST to Limit Work on CVE Entries as Submissions Surge
NewsApr 15, 2026

NIST to Limit Work on CVE Entries as Submissions Surge

The National Institute of Standards and Technology (NIST) announced it will limit enrichment of CVE entries to those meeting a new risk‑based threshold, ending its practice of adding details to every vulnerability. Submissions in the first quarter of 2026 are...

By The Record by Recorded Future
As AI Infosec Woes Heighten, IBM Intros Autonomous Security Service
NewsApr 15, 2026

As AI Infosec Woes Heighten, IBM Intros Autonomous Security Service

IBM unveiled its Autonomous Security service, an AI‑agent platform that scans software exposures and runtime environments to automatically identify and remediate vulnerabilities. The launch coincides with heightened concern over Anthropic's Mythos and OpenAI's GPT‑5.4‑Cyber models, which can uncover thousands of...

By AI Business
Navigating the Unique Security Risks of Asia's Digital Supply Chain
NewsApr 15, 2026

Navigating the Unique Security Risks of Asia's Digital Supply Chain

At Black Hat Asia 2026, a panel of security leaders from Bitdefender, ISACA, Varonis and others will dissect the unique third‑party risk landscape of Asia’s hyper‑connected digital supply chain. The discussion highlights how divergent regulations across countries—exemplified by a U.S....

By Dark Reading
SAP Security Patch Day April 2026: Critical Vulnerabilities, CVSS 9.9 SQL Injection, and Authorization Risks
NewsApr 15, 2026

SAP Security Patch Day April 2026: Critical Vulnerabilities, CVSS 9.9 SQL Injection, and Authorization Risks

On April 2026 SAP released its monthly Security Patch Day, publishing 19 new security notes and an update. The most critical issue is a CVSS 9.9 SQL injection vulnerability in SAP Business Planning and Consolidation and SAP Business Warehouse that...

By ERP Today
CIOs Fret over Rising Security Concerns Amid AI Adoption
NewsApr 15, 2026

CIOs Fret over Rising Security Concerns Amid AI Adoption

A Logicalis survey of more than 1,000 CIOs reveals AI is now viewed as a top security threat, with over a quarter ranking it alongside malware, ransomware and phishing. 57% say employee misuse of AI jeopardizes data, yet only 37% have...

By CIO Dive
Ukraine Warns of Surge in Cyberattacks on Hospitals, Local Governments by UAC-0247 Hackers
NewsApr 15, 2026

Ukraine Warns of Surge in Cyberattacks on Hospitals, Local Governments by UAC-0247 Hackers

Ukrainian cyber‑defense agency CERT‑UA reported a sharp increase in attacks by the UAC‑0247 threat cluster targeting hospitals, emergency services, and local government bodies between March and April 2026. The campaign uses phishing emails that pose as humanitarian aid offers, delivering...

By The Cyber Express
Aave Labs Launches Checkpoint, AI-Powered Governance Security System: Aave Labs
NewsApr 15, 2026

Aave Labs Launches Checkpoint, AI-Powered Governance Security System: Aave Labs

Aave Labs unveiled Aave Checkpoint on April 15, an AI‑powered governance security system that adds a multi‑layered review process for every DAO proposal before on‑chain execution. The platform pairs automated AI analysis with a mandatory human verification step, operating alongside Certora’s...

By The Defiant
PCI Pal Earns HITRUST and SOC 2 Type II Certifications
NewsApr 15, 2026

PCI Pal Earns HITRUST and SOC 2 Type II Certifications

PCI Pal announced it has earned both SOC 2 Type II attestation and HITRUST certification, confirming the robustness of its data protection, governance, and risk‑management controls. The certifications were achieved alongside a formal alignment with HIPAA requirements, strengthening the company’s offering for...

By destinationCRM (CRM Magazine)
UK Businesses Must Face up to AI Threat, Says Government
NewsApr 15, 2026

UK Businesses Must Face up to AI Threat, Says Government

The UK government warned that frontier AI models, exemplified by Anthropic’s Mythos, can autonomously discover and exploit software vulnerabilities, a capability that is doubling every four months. Business Secretary Liz Kendall said these models shift cyber threats from a few...

By ComputerWeekly – DevOps
Expect More Cybersecurity Executive Orders Soon, National Cyber Director Says
NewsApr 15, 2026

Expect More Cybersecurity Executive Orders Soon, National Cyber Director Says

President Donald Trump is expected to sign additional cybersecurity‑focused executive orders soon, National Cyber Director Sean Cairncross said at the Semafor World Economy forum. The move follows the release of the administration’s second national cyber strategy, which outlines goals such...

By FCW (GovExec Technology)
Microsoft's Latest Windows Update Now Confirms if Your PC Is Secure Boot-Protected - How It Works
NewsApr 15, 2026

Microsoft's Latest Windows Update Now Confirms if Your PC Is Secure Boot-Protected - How It Works

Microsoft’s April 2026 Patch Tuesday adds a visual Secure Boot status indicator to Windows 10 and Windows 11, showing green, yellow, or red icons that reflect the health of the boot‑chain certificates. The update also replaces aging Secure Boot certificates that will expire in...

By ZDNet – Business
Microsoft Pays $2.3M for Cloud and AI Flaws at Zero Day Quest
NewsApr 15, 2026

Microsoft Pays $2.3M for Cloud and AI Flaws at Zero Day Quest

Microsoft awarded $2.3 million to security researchers after the 2026 Zero Day Quest, recognizing over 80 high‑impact cloud and AI flaws uncovered during the live event. The contest attracted nearly 700 submissions from participants in more than 20 countries, building on...

By BleepingComputer
Get Ahead of Cybersecurity Concerns With This Training Bundle for $20
NewsApr 15, 2026

Get Ahead of Cybersecurity Concerns With This Training Bundle for $20

Entrepreneur is promoting the 2026 AI Security & Cybersecurity Expert Bundle, a six‑course package from Oak Academy that delivers more than 85 hours of instruction on AI safety, penetration testing, and CompTIA exam prep. The bundle is priced at $19.97,...

By Entrepreneur » Sales
Microsoft Issues Massive Windows Patch for 160+ Bugs, Including Two Zero-Days
NewsApr 15, 2026

Microsoft Issues Massive Windows Patch for 160+ Bugs, Including Two Zero-Days

Microsoft rolled out its second‑largest monthly update, patching 165 vulnerabilities, including two zero‑day flaws in SharePoint Server and Microsoft Defender. The patch marks a sharp rise in reported bugs, a trend analysts link to AI‑generated vulnerability disclosures. Eight critical bugs,...

By TechRepublic – Articles
European Cybersecurity Agency ENISA Seeks Top-Tier Status in CVE Program
NewsApr 15, 2026

European Cybersecurity Agency ENISA Seeks Top-Tier Status in CVE Program

ENISA, the EU’s cybersecurity agency, is pursuing top‑level root CVE Numbering Authority (TL‑Root CNA) status, aiming for approval by 2026 or early 2027. The move follows ENISA’s recent elevation to a root CNA in 2025 and would place it alongside...

By Infosecurity Magazine
Cybersecurity Experts Raise the Alarm over Windows Recall Again: 'The Vault Door Is Titanium. The Wall Next to It Is...
NewsApr 15, 2026

Cybersecurity Experts Raise the Alarm over Windows Recall Again: 'The Vault Door Is Titanium. The Wall Next to It Is...

Microsoft’s AI‑driven Windows Recall feature, which records a visual timeline of user activity, has been redesigned after multiple recalls, but security researcher Alexander Hagenah has released a tool called TotalRecall Reloaded that can siphon the vault’s decrypted data. Hagenah argues...

By PC Gamer
One-Click Security Scanning and Org-Wide Alert Triage Come to Advanced Security
NewsApr 15, 2026

One-Click Security Scanning and Org-Wide Alert Triage Come to Advanced Security

Microsoft Azure DevOps Advanced Security now offers two major capabilities: a CodeQL default setup that enables one‑click, organization‑wide code scanning without manual pipeline configuration, and a combined alerts experience in Security Overview that consolidates all repository alerts into a single...

By Azure DevOps Blog
Medium-Severity Flaw in Microsoft SharePoint Exploited
NewsApr 15, 2026

Medium-Severity Flaw in Microsoft SharePoint Exploited

Microsoft’s SharePoint platform is being actively exploited via CVE‑2026‑32201, a medium‑severity input‑validation flaw with a CVSS score of 6.5. The vulnerability enables attackers to spoof network traffic and modify confidential data. Threat‑intelligence firm Defused observed a coordinated reconnaissance campaign across...

By Cybersecurity Dive (Industry Dive)
Sentra, Wiz Link Data Risk to Cloud Findings
NewsApr 15, 2026

Sentra, Wiz Link Data Risk to Cloud Findings

Sentra has partnered with cloud‑security platform Wiz to embed its data‑classification intelligence into Wiz’s Security Graph. The integration tags cloud misconfigurations and attack paths with sensitivity labels, letting teams focus on risks that touch regulated or business‑critical data. Continuous syncing...

By ChannelE2E
CISA Flags Windows Task Host Vulnerability as Exploited in Attacks
NewsApr 15, 2026

CISA Flags Windows Task Host Vulnerability as Exploited in Attacks

CISA has placed the Windows Task Host privilege‑escalation flaw (CVE‑2025‑60710) on its catalog of actively exploited vulnerabilities, urging federal agencies to apply Microsoft’s November 2025 patch within two weeks. The defect allows a low‑complexity local attack to elevate a standard user...

By BleepingComputer
Exploited Vulnerability Exposes Nginx Servers to Hacking
NewsApr 15, 2026

Exploited Vulnerability Exposes Nginx Servers to Hacking

A critical vulnerability (CVE‑2026‑33032) in Nginx UI’s AI‑driven management console has been exploited in the wild, allowing unauthenticated attackers to take full control of servers. Pluto Security identified more than 2,600 internet‑exposed instances and demonstrated a proof‑of‑concept exploit. The flaw...

By SecurityWeek
Signed Adware Operation Disables Antivirus Across 23,000 Hosts
NewsApr 15, 2026

Signed Adware Operation Disables Antivirus Across 23,000 Hosts

A signed software operation linked to Dragon Boss Solutions has been silently disabling antivirus products on more than 23,000 endpoints worldwide. The campaign uses a legitimate code‑signing certificate and an Advanced Installer‑based update mechanism to deliver a PowerShell payload, ClockRemoval.ps1,...

By Infosecurity Magazine
Audit: Big Tech Often Ignores CA Privacy Law Opt-Out Requests
NewsApr 15, 2026

Audit: Big Tech Often Ignores CA Privacy Law Opt-Out Requests

An independent WebXray audit of 7,634 California‑origin sites found that Google, Meta and Microsoft routinely ignore Global Privacy Control (GPC) opt‑out signals, violating the California Consumer Privacy Act (CCPA). Google showed the highest non‑compliance, failing to honor GPC requests on...

By Dark Reading
HSCC Unveils 3rd-Party AI Risk & Supply Chain Transparency Guide
NewsApr 15, 2026

HSCC Unveils 3rd-Party AI Risk & Supply Chain Transparency Guide

The Health Sector Coordinating Council’s Cybersecurity Working Group released an AI Cyber Glossary and a 109‑page "Health Industry Third‑Party AI Risk and Supply Chain Transparency Guide." The guide outlines a seven‑phase lifecycle for AI vendor risk, drawing from NIST’s AI...

By healthsystemCIO
AI Agents Using Anthropic MCP Could Be a Vector for Supply Chain Attacks, Claim Researchers
NewsApr 15, 2026

AI Agents Using Anthropic MCP Could Be a Vector for Supply Chain Attacks, Claim Researchers

Researchers at OX Security have uncovered a systemic flaw in Anthropic's Model Context Protocol (MCP) that permits arbitrary command execution on any server running a vulnerable implementation. The vulnerability allowed the team to breach six production services, exposing user data,...

By ITPro
Brace Yourselves for a Vulnerability Explosion, Forescout Warns
NewsApr 15, 2026

Brace Yourselves for a Vulnerability Explosion, Forescout Warns

Forescout’s latest research shows AI models have moved from a 55% failure rate in vulnerability detection to near‑perfect identification, signaling a rapid acceleration in flaw discovery. The firm warns that this surge will flood vendors with far more CVE reports,...

By ITPro
Broadcom Announces VMware Tanzu Platform Agent Foundations for Security, PaaS Simplicity
NewsApr 15, 2026

Broadcom Announces VMware Tanzu Platform Agent Foundations for Security, PaaS Simplicity

Broadcom unveiled the VMware Tanzu Platform agent foundations, a secure, pre‑built PaaS layer for AI agents that runs on VMware Cloud Foundation. The offering leverages cloud‑native Buildpacks, structural secrets isolation, and zero‑trust networking to harden containers against malware and data...

By SD Times
Actively Exploited Nginx-Ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover
NewsApr 15, 2026

Actively Exploited Nginx-Ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover

A critical authentication‑bypass flaw (CVE‑2026‑33032, CVSS 9.8) in the open‑source nginx‑ui management console is being actively exploited, allowing attackers to seize full control of Nginx services. The vulnerability stems from two MCP endpoints that default to an empty IP whitelist, effectively...

By The Hacker News
April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More
NewsApr 15, 2026

April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More

April’s Patch Tuesday delivered a wave of critical fixes across major vendors, highlighted by a CVSS 9.9 SQL‑injection flaw in SAP Business Planning and Consolidation that lets low‑privileged users execute arbitrary database commands. Adobe Acrobat Reader faced a remote‑code‑execution vulnerability (CVSS 8.6)...

By The Hacker News
Security Leaders Overconfident About Ransomware Recovery
NewsApr 15, 2026

Security Leaders Overconfident About Ransomware Recovery

Veeam’s 2026 Data Trust and Resilience Report reveals a stark gap between confidence and reality in ransomware recovery. While nine‑in‑ten security leaders believe they can bounce back quickly, only 28% actually restore all compromised data, with an average recovery rate...

By ITPro
Copilot and Agentforce Fall to Form-Based Prompt Injection Tricks
NewsApr 15, 2026

Copilot and Agentforce Fall to Form-Based Prompt Injection Tricks

Security researchers at Capsule Security uncovered prompt‑injection flaws in Microsoft Copilot Studio and Salesforce Agentforce that let attackers exfiltrate data via ordinary SharePoint and lead forms. In Copilot, the “ShareLeak” vulnerability (CVE‑2026‑21520) lets a crafted comment field override system prompts...

By CSO Online
Booking.com Customers Warned of 'Reservation Hijacking' After Hack
NewsApr 15, 2026

Booking.com Customers Warned of 'Reservation Hijacking' After Hack

Booking.com disclosed a data breach that exposed customer names, email addresses, phone numbers and detailed booking information. The leak has sparked a surge in “reservation hijack” scams, where fraudsters impersonate hotels to extract money from travelers. Booking.com responded by resetting...

By BBC – Technology
Don't Scan That QR Code Yet: The New Scam Threatening Your Phone
NewsApr 15, 2026

Don't Scan That QR Code Yet: The New Scam Threatening Your Phone

A new package scam uses QR codes on unlabeled deliveries to lure recipients into malicious sites or trigger malware downloads. The scheme, which began this summer, is expected to grow as holiday shopping and iPhone Air purchases increase. Victims are...

By CNET (All)
Microsoft, Salesforce Patch AI Agent Data Leak Flaws
NewsApr 15, 2026

Microsoft, Salesforce Patch AI Agent Data Leak Flaws

Security vendor Capsule Security disclosed two high‑severity prompt‑injection vulnerabilities affecting Salesforce’s Agentforce (“PipeLeak”) and Microsoft’s Copilot (“ShareLeak”). The flaws let attackers inject malicious prompts into public‑facing forms, causing unauthorized extraction of CRM leads and SharePoint data, respectively. Both companies have...

By Dark Reading
Malware Is Scary. Here's CNET's Guide to Cleaning an Infected Laptop
NewsApr 15, 2026

Malware Is Scary. Here's CNET's Guide to Cleaning an Infected Laptop

CNET’s latest guide walks users through a step‑by‑step recovery playbook for laptops infected with malware, emphasizing immediate isolation, dual‑scanner verification, and cautious data restoration. The guide cites an antivirus survey showing 88% of U.S. laptop owners took action against malware...

By CNET (All)
Cyberscammers Are Bypassing Banks’ Security with Illicit Tools Sold on Telegram
NewsApr 15, 2026

Cyberscammers Are Bypassing Banks’ Security with Illicit Tools Sold on Telegram

Cybercriminals are buying virtual‑camera kits on Telegram that spoof facial‑recognition checks, allowing them to defeat KYC verification in banking apps and crypto exchanges. The tools replace live video with pre‑recorded images or deepfakes, enabling scammers to open mule accounts and...

By MIT Technology Review
Vodafone Rolls Out New Scam Fighting AI Tool
NewsApr 15, 2026

Vodafone Rolls Out New Scam Fighting AI Tool

Vodafone has integrated an AI‑driven Scam Call Protection feature into its Secure Net Mobile service, automatically analyzing inbound calls and flagging suspicious numbers with on‑screen alerts. The tool operates in the background, requiring no extra apps, and joins existing safeguards...

By Telecoms.com
Deepfakes Are a Weapon of Mass Manipulation and Most People Can’t Spot Them
NewsApr 15, 2026

Deepfakes Are a Weapon of Mass Manipulation and Most People Can’t Spot Them

A new IdentifAI report finds deepfakes have evolved into a geopolitical and financial weapon, with 24.6% of incidents aimed at political manipulation and 20.1% targeting fraud. Video‑based fakes dominate at 45.6% of attacks, and the platform X accounts for 51.2%...

By Biometric Update
Bitcoin Developers Propose Freezing Quantum-Vulnerable Coins in BIP-361
NewsApr 15, 2026

Bitcoin Developers Propose Freezing Quantum-Vulnerable Coins in BIP-361

Bitcoin developers and researchers have introduced BIP‑361, a proposal to freeze coins held in legacy addresses that are vulnerable to future quantum attacks. The mechanism would lock up lost or abandoned UTXOs tied to non‑quantum‑resistant keys, effectively shrinking the active...

By The Defiant
AI Companies to Play Bigger Role in CVE Program, Says CISA
NewsApr 15, 2026

AI Companies to Play Bigger Role in CVE Program, Says CISA

CISA’s Vulnerability Response & Coordination chief Lindsey Cerkovnik urged AI firms such as OpenAI and Anthropic to gain stronger representation in the Common Vulnerabilities and Exposures (CVE) program. The call follows the debut of Anthropic’s Claude Mythos Preview and OpenAI’s...

By Infosecurity Magazine
DOE Allocates $160M to Secure Energy Systems as Cyber Threats Converge With Grid Modernization
NewsApr 15, 2026

DOE Allocates $160M to Secure Energy Systems as Cyber Threats Converge With Grid Modernization

The U.S. Department of Energy’s FY 2027 budget earmarks $160 million for the Office of Cybersecurity, Energy Security, and Emergency Response (CESER). The funding will bolster protection of the nation’s energy grid, its supply chain, and nuclear assets while deploying rapid‑response experts...

By Homeland Security Today (HSToday)
Rethinking Insider Risk in the Age of AI and Autonomy
NewsApr 15, 2026

Rethinking Insider Risk in the Age of AI and Autonomy

Insider risk now accounts for roughly half of all data breaches, a figure amplified by remote and hybrid work models. The rise of AI‑driven productivity tools introduces new, often inadvertent, leakage pathways as employees bypass sanctioned systems. Traditional defenses like...

By Silicon UK
The Deepfake Dilemma: From Financial Fraud to Reputational Crisis
NewsApr 15, 2026

The Deepfake Dilemma: From Financial Fraud to Reputational Crisis

Deepfake technology has moved from a niche curiosity to a cheap, widely accessible threat, with a 2025 Gartner survey showing 43% of cybersecurity leaders encountering audio deepfakes and 37% facing video deepfakes in the past year. The fraud potential is...

By CSO Online
The Deepfake Nudes Crisis in Schools Is Much Worse Than You Thought
NewsApr 15, 2026

The Deepfake Nudes Crisis in Schools Is Much Worse Than You Thought

A new analysis by WIRED and Indicator shows deepfake sexual abuse has spread to at least 90 schools in 28 countries, affecting more than 600 students. Since 2023, roughly 30 incidents have been reported in North America, with additional cases...

By WIRED
13.5M Device Botnet Drives 2 Tbps DDoS Attacks on FinTech, Qrator Finds
NewsApr 15, 2026

13.5M Device Botnet Drives 2 Tbps DDoS Attacks on FinTech, Qrator Finds

Qrator Labs reported that the world’s biggest DDoS botnet has swelled to about 13.5 million compromised devices, a ten‑fold increase since March 2025. The network can launch attacks up to 2.065 Tbps, with a recent assault sustaining that peak for forty minutes....

By HackRead