Cybersecurity Social Media and Updates

Elliptic Curve Crypto Underpins All Protocols—Removing It Requires Complete Rebuild
SocialMar 31, 2026

Elliptic Curve Crypto Underpins All Protocols—Removing It Requires Complete Rebuild

"Everything relies on elliptic curve cryptography. If you remove that foundation, you need to rebuild EVERYTHING. The issue? Most protocols use this." https://t.co/OMA9HmxIQs

By Laura Shin
Unsolicited Loan Data Leak Exposes Flawed Third‑Party Sharing
SocialMar 31, 2026

Unsolicited Loan Data Leak Exposes Flawed Third‑Party Sharing

Great. My phone number was found on the dark web in conjunction with a breach of a site I don’t even use. Third party data sharing is not cool. Apparently it is a fintech blockchain HELOC company. Definitely did not...

By Teri Radichel
Essential Security Docs Most Orgs Still Miss
SocialMar 31, 2026

Essential Security Docs Most Orgs Still Miss

Cybersecurity scales with process + templates 🔐 Key docs every org needs: 🛡️ InfoSec: incident logs, access matrix, data classification 🌐 Network: DDoS plan, VPN/NAC logs, patch schedule ☁️ Cloud: config baseline, IR log, backup testing, asset inventory 🧩 AppSec: secure coding checklist, SAST logs,...

By Giuliano Liguori
Quantum Leap: 10k Atomic Qubits Threaten Crypto Security
SocialMar 31, 2026

Quantum Leap: 10k Atomic Qubits Threaten Crypto Security

From “millions of qubits” to ~10,000 atomic qubits. That’s a major shift. What does it mean for Bitcoin, Ethereum, and cryptography? We break it down live. https://t.co/OMA9HmxIQs

By Laura Shin
Quantum Leap Brings Excitement and Cryptographic Risks
SocialMar 31, 2026

Quantum Leap Brings Excitement and Cryptographic Risks

"It's clear we are crossing a moment. It's exciting. We'll be able to use quantum computers. But it's CONCERNING too, because it'll be cryptographically relevant." Dolev Bluvstein https://t.co/OMA9HmxIQs

By Laura Shin
Quantum Leap Could Accelerate Crypto's Existential Threat
SocialMar 31, 2026

Quantum Leap Could Accelerate Crypto's Existential Threat

A new quantum breakthrough may have cut the timeline dramatically. On Unchained, Alex Pruden and Dolev Bluvstein join me to discuss: ⚛️ When quantum becomes a real threat 🔐 What breaks first in crypto ⏳ Whether we’re already behind https://t.co/OMA9HmxIQs

By Laura Shin
AI Agent Identity Layer: Next Cybersecurity Frontier
SocialMar 31, 2026

AI Agent Identity Layer: Next Cybersecurity Frontier

I recently joined @reckless on @DecoderPod to discuss the “SaaSpocalypse,” the future of software, and why the identity layer for AI agents could become the biggest category in cyber. Really enjoyed this conversation: https://t.co/afZ84f2ymM

By Todd McKinnon
State Quantum Power Lies in Hidden Communications Exploitation
SocialMar 31, 2026

State Quantum Power Lies in Hidden Communications Exploitation

Ok I just want to add one thing. Folks, for state actors, the value of having a quantum computer is massively higher if you DON’T tell people you have a quantum computer. Exploiting Bitcoin is a parlor trick. Exploiting the world’s communications...

By Matthew Green
Victims Receive $27.92 Settlement After 2024 Evolve Hack
SocialMar 31, 2026

Victims Receive $27.92 Settlement After 2024 Evolve Hack

Remember back in 2024 when a Russian cybercrime group hacked Evolve and exfiltrated terabytes of data, including user data like SSN and account numbers? Victims are finally getting their settlement payments: $27.92 https://t.co/9rKUgGOh5I

By Jason Mikula
Secure Hybrid Self‑Managed and Managed MCP Server Setup
SocialMar 31, 2026

Secure Hybrid Self‑Managed and Managed MCP Server Setup

You could use a mix of self-managed and managed MCP servers. Here's an example of using both, and securing them in a production-ready way. https://t.co/reHeaq6QEV https://t.co/5pLxHwGKWv

By Richard Seroter
Anthropic's Claude Code Leak Exposes Internal Architecture
SocialMar 31, 2026

Anthropic's Claude Code Leak Exposes Internal Architecture

Oh boy, including "Undercover" Claude -> Claude Code's source code appears to have leaked via a misconfigured npm package, revealing internal codenames, a “Self-Healing Memory” architecture, and more "For Anthropic, a company currently riding a meteoric rise with a...

By Glenn Gabe
Dynamic Identity Systems Needed for Independent AI Agents
SocialMar 31, 2026

Dynamic Identity Systems Needed for Independent AI Agents

Identity for AI agents came up in almost every serious conversation last week at RSAC. It is not just “give them an identity.” It is that: identities are dynamic agents act independently and they will outnumber humans We built identity systems for people. Now we need...

By Sean D. Mack
BeyondTrust Reveals New Token Injection and Exfiltration Vectors
SocialMar 31, 2026

BeyondTrust Reveals New Token Injection and Exfiltration Vectors

Where else can the tokens be injected and exfiltrated. This is the original report from BeyondTrust.

By Teri Radichel
Autonomous Agents Risk Malicious Prompts Despite Sandbox Efforts
SocialMar 31, 2026

Autonomous Agents Risk Malicious Prompts Despite Sandbox Efforts

This is the type of thing I’m worried about with completely “autonomous” agents only the inclusion of something more malicious than ads. It could be unintentional or via prompt injection. I have some tools that can run while I’m sleeping...

By Teri Radichel
AI Safety Becomes a Cybersecurity Priority
SocialMar 31, 2026

AI Safety Becomes a Cybersecurity Priority

AI safety has entered the cybersecurity era. 
@IrenaCronin and I write this newsletter every week.   AI safety is becoming a cybersecurity issue because advanced AI can now help both defenders and attackers, making the risks more immediate and practical. As AI systems...

By Robert Scoble
DNS Covert Channel Bypasses AI Guardrails, Enables Remote Shell
SocialMar 31, 2026

DNS Covert Channel Bypasses AI Guardrails, Enables Remote Shell

“Specifically, it abuses a hidden DNS-based communication path as a "covert transport mechanism" by encoding information into DNS requests to get around visible AI guardrails. What's more, the same hidden communication path could be used to establish remote shell access...

By Teri Radichel
Map Data, Centralize Control—Simple Shift, Big Cybersecurity Impact
SocialMar 31, 2026

Map Data, Centralize Control—Simple Shift, Big Cybersecurity Impact

Cybersecurity is overdue for a makeover. More of a focus on knowing where data lives, who has access, and how risk moves. One university proved it: map the data, identify real risks, centralize control. Simple shift. Big impact. https://t.co/GLJlBbM1uN

By Cristina Dolan
AI's Dual Role Fuels Security Edge at RSAC
SocialMar 31, 2026

AI's Dual Role Fuels Security Edge at RSAC

“AI on Both Sides: Friend, Foe, and Everything In Between” RSAC 2026 Recap: Chatbots, Deepfakes, and Smart Glasses Highlight a Security World on Edge https://t.co/qHl5CXvVip #RSAC #RSAC26 https://t.co/IgIm5EZ5DI

By Glen Gilmore
AI Code Leaks Boost Demand for Software Security Jobs
SocialMar 31, 2026

AI Code Leaks Boost Demand for Software Security Jobs

Woke up to news of supply chain attacks on NPM and Claude Code’s source code leaking…again. It seems the only tech jobs that AI with any job security are going to be software security jobs. It’s only going to get...

By Dare Obasanjo
From AI Risks to Rapid Control Implementation
SocialMar 31, 2026

From AI Risks to Rapid Control Implementation

I hosted a roundtable at RSAC with NTT Data on AI risk. The conversation has shifted. We are past “what are the risks of AI.” Now it is: how do we operationalize controls fast enough? That is a very different problem.

By Sean D. Mack
Quantum Crypto Threats Unlikely Within Our Lifetime
SocialMar 31, 2026

Quantum Crypto Threats Unlikely Within Our Lifetime

Neat paper on securing cryptocurrencies against quantum attacks. I want to stress that I am not convinced we have anything to worry about in my lifetime. This tweet might haunt me. https://t.co/d1i4reP93g

By Matthew Green
AI Model Mythos Amplifies Attack Scale and Internal Threats
SocialMar 31, 2026

AI Model Mythos Amplifies Attack Scale and Internal Threats

A leaked model is raising new concerns about AI and cybersecurity. Anthropic’s “Mythos” is described as a step change in capability, especially in how AI agents can act, reason and operate independently. That makes it easier for attackers to scale operations...

By Spiros Margaris
PQC Adoption Accelerates as Qubit Requirements Shrink
SocialMar 31, 2026

PQC Adoption Accelerates as Qubit Requirements Shrink

More warning lights keep blinking for the urgency of PQC adoption in many fields as advances in both hardware and algorithm construction keep reducing the number of qubits and gates needed for a CRQC. https://t.co/55FxttUDdD https://t.co/nmDa4iDWbr https://t.co/MOfzj3Tl4O

By Phil Venables
AI Cyberattacks Surge, Cloudflare’s AI Defense Boosts $NET
SocialMar 31, 2026

AI Cyberattacks Surge, Cloudflare’s AI Defense Boosts $NET

AI-driven cyberattacks are scaling rapidly — and $NET is a direct beneficiary Cloudflare’s AI-powered defense, driven by Cloudforce One and its global network, now blocks ~230 billion threats daily. Attack sophistication is rising fast. AI is being used for exploit development, network mapping,...

By Sergey CYW
Claude's Source Code Allegedly Exposed Through Npm Map File
SocialMar 31, 2026

Claude's Source Code Allegedly Exposed Through Npm Map File

WILD if true. @Fried_rice is reporting that Claude's source code leaked via an npm .map file 👀 Code: https://t.co/nQFCcCCc6Z https://t.co/ACLKa6wVFf

By Data Chaz
Quickly Detect Axios Supply‑Chain Compromise with New Claude Skill
SocialMar 31, 2026

Quickly Detect Axios Supply‑Chain Compromise with New Claude Skill

🚨 Want to quickly check if you've been compromised by the Axios supply-chain attack? Hari (@hrkrshnn) just shipped a free @claudeai skill for us 🙏 /plugin marketplace add cantinasec/plugins /plugin install cantinasec@cantinasec-plugins /reload-plugins /cantinasec:axios https://t.co/XlUdHdDcl7

By Data Chaz
IOS 26.5 Restores Encryption, Paves Way for Maps Ads
SocialMar 31, 2026

IOS 26.5 Restores Encryption, Paves Way for Maps Ads

iOS 26.5 brings back end-to-end encryption when messaging Android users, but it also brings us one step closer to ads in Apple Maps. https://t.co/uhPJbpMa8C

By TechRadar
Supply Chain Attacks Force Permanent Passwordless Rotation
SocialMar 31, 2026

Supply Chain Attacks Force Permanent Passwordless Rotation

Whoever is doing all the supply chain attacks really wants us to switch to passwordless auth for everything. If the cadence of attacks continues we will end up just having to permanently rotate everything for the rest of the year.

By Jascha Beste
Consumers Shouldn't Bear the Burden of Spotting Scams
SocialMar 31, 2026

Consumers Shouldn't Bear the Burden of Spotting Scams

Why should consumers be the ones trying to work out whether something is a scam or not? #CyberSecurity #Scam #Fraud #DigitalSignatures https://t.co/UykiRfLj5z

By Dave Birch
Beyond Pinning: Harden Node and Python Supply Chains
SocialMar 31, 2026

Beyond Pinning: Harden Node and Python Supply Chains

Supply chain attacks are becoming more frequent, and far more serious. What are sensible practices to protect against these when using Node or Python packages? I assume pinning versions is the bare minimum; for those with security teams / tools: why else...

By Gergely Orosz
Scaling Speed and Trust in AI-Driven Systems
SocialMar 31, 2026

Scaling Speed and Trust in AI-Driven Systems

How do we build systems where speed and trust can scale together? I explored this with @MichaelLeland, field CTO of #island at RSA and it’s the challenge of the AI era. AI is now an actor. Fast, boundaryless, and creating risks most...

By Helen Yu
Bitcoin Must Start Quantum-Resilience Work Today
SocialMar 31, 2026

Bitcoin Must Start Quantum-Resilience Work Today

Bitcoin needs to get ready for the quantum era. We need to strengthen initiatives like BIP 360. We need to invest more efforts in finding creative, smart solutions to ensure Bitcoin is post-quantum secure. Saying that quantum computers are coming is not FUD....

By Eli Ben-Sasson
Npm Supply Chain Attacks Becoming Disturbingly Frequent
SocialMar 31, 2026

Npm Supply Chain Attacks Becoming Disturbingly Frequent

is it me or supply chain attacks on npm are getting regular occurrence these days?

By Oleg Ciubotaru
AI Automation Fuels Sophisticated, Costly Cyberattacks Across Businesses
SocialMar 31, 2026

AI Automation Fuels Sophisticated, Costly Cyberattacks Across Businesses

AI-driven cyberattacks are becoming more sophisticated and costly, with automation enabling highly targeted phishing, synthetic identities, and a surge in ransomware and coordinated attacks impacting businesses of all sizes. cybersecurity

By Phys.org Threads
Treat AI Agents Like Malware: Three Safety Lessons
SocialMar 31, 2026

Treat AI Agents Like Malware: Three Safety Lessons

AI Agents Act a Lot Like Malware. 3 core lessons that can help companies safely adopt agentic AI https://t.co/jmHx1BceXK https://t.co/nhAWPPp2OG

By Glen Gilmore
Hardware Advances Slash RSA Break Time to Minutes
SocialMar 31, 2026

Hardware Advances Slash RSA Break Time to Minutes

Still a lot to build on the hardware side, but the last state of the art papers were stating about 8 hours to crack RSA, now it's 9 minutes. Lots of gates, lots of hardware, but we are seeing quite...

By Anastasia Marchenkova
Beware: Surge of Fake Scammer Profiles Targeting DMs
SocialMar 31, 2026

Beware: Surge of Fake Scammer Profiles Targeting DMs

big influx of fake scammer profiles on here, be careful out there folk (be very wary of people DM-ing you out of the blue or inviting your to chatrooms etc)

By Callum Thomas
AI Bot PwnedClaw Analyzes This Week's Data Breaches
SocialMar 31, 2026

AI Bot PwnedClaw Analyzes This Week's Data Breaches

Weekly update is up! Join Me in Investigating Today’s Data Breaches With the PwnedClaw, the OpenClaw Agentic AI Bot Doing My Legwork: https://t.co/KeML1pLTOL

By Troy Hunt
AI Will Supercharge Security, But Transition Will Be Rough
SocialMar 31, 2026

AI Will Supercharge Security, But Transition Will Be Rough

I think the situation with AI and security this talk highlights is kind of indicative of how AI disruption will play out. AI is going to make it really, really easy and cheap to find exploits in software. The end...

By Jay Kreps
Most Firms Can't Apply Zero Trust to AI Agents
SocialMar 30, 2026

Most Firms Can't Apply Zero Trust to AI Agents

Zero trust for humans – but implicit trust for machines? - Raconteur “In 65% of organisations, zero trust controls cannot secure non-human identities (NHIs), including new agentic AI systems.” https://t.co/pK57KjAzoS https://t.co/JA0DMauDdc

By Glen Gilmore
Shadow AI Emerges as Active Threat Amid Rapid Adoption
SocialMar 30, 2026

Shadow AI Emerges as Active Threat Amid Rapid Adoption

Shadow IT was always a problem. Shadow AI is different. Now it can act, not just exist. And the pace of adoption is like nothing I have seen before. What are you doing to manage shadow AI?

By Sean D. Mack
National Labs Drive Multi‑Agency Solar Cybersecurity Standards
SocialMar 30, 2026

National Labs Drive Multi‑Agency Solar Cybersecurity Standards

National laboratories lead multi-agency push for solar cybersecurity standards #energysky -- via pv magazine usa: https://t.co/2zCsruApti

By Tor “SolarFred” Valenza
Veteran Researcher Warns: AI-Driven Security Apocalypse Underway
SocialMar 30, 2026

Veteran Researcher Warns: AI-Driven Security Apocalypse Underway

Another veteran computer security research — Thomas Ptacek — says we're currently in middle of the Computer Security AIpocalypse: https://t.co/80HQZjpMDb https://t.co/8llU4N93SX

By Zooko Wilcox-O'Hearn
New Have I Been Pwned Features Boost Privacy, Usability, Performance
SocialMar 30, 2026

New Have I Been Pwned Features Boost Privacy, Usability, Performance

Today, after many months of hard work, we're launching a bunch of new @haveibeenpwned features that improve privacy, usability and performance. We're a little team, but we've done a lot since this pic in November. Here are all the details:...

By Troy Hunt
Never Store Passports; Avoid KYC Data Leaks
SocialMar 30, 2026

Never Store Passports; Avoid KYC Data Leaks

I'm not sending anyone my passport anymore My Portuguese lawyer wanted me to email her a copy of my passport for KYC I rejected and she was confused "I've never been hacked" 99% of people are not aware any account probably can and will...

By Pieter Levels
New WordPress Flaw Lets Hackers Read Any File
SocialMar 30, 2026

New WordPress Flaw Lets Hackers Read Any File

Hackers can read arbitrary files, including those containing passwords, with this newly discovered WordPress flaw. https://t.co/rCE6SHGYXW

By TechRadar
Secure Sandbox Empowers Local AI Assistants with Control
SocialMar 30, 2026

Secure Sandbox Empowers Local AI Assistants with Control

OpenClaw has proven that local AI assistants have product-market fit. But the big issue with them has been security. The team at @Pokee_AI is fixing it with PokeeClaw: works like OpenClaw, but with in a secure sandbox architecture with isolated environments, approval workflows,...

By François Chollet
Identity Remains Primary Defense in AI-Driven Threats
SocialMar 30, 2026

Identity Remains Primary Defense in AI-Driven Threats

Identity is the first line of defense, especially in an AI-fueled threat landscape | Cybersecurity Dive https://t.co/8y0zjDUN0H

By Chuck Brooks
Drone Attacks Expose Risk of Centralized Cloud Infrastructure
SocialMar 30, 2026

Drone Attacks Expose Risk of Centralized Cloud Infrastructure

Iranian drones hit AWS data centres twice this month. Banks went down. Apps went offline. Thats centralised cloud, one strike and everything breaks. This war is making the case for decentralised computing like Ocean Network. No single point of failure. No data centre...

By Layah Heilpern