Cybersecurity Social Media and Updates

Bitcoin Must Upgrade for Post‑Quantum Security
SocialApr 12, 2026

Bitcoin Must Upgrade for Post‑Quantum Security

Just to be clear: does this mean Bitcoin doesn't need to upgrade to be post-quantum secure? ABSOLUTELY NOT. Bitcoin should ABSOLUTELY take the necessary steps to become PQS.

By Eli Ben-Sasson
MedStar Health Breach Exposes Names, SSNs, Medical Records
SocialApr 11, 2026

MedStar Health Breach Exposes Names, SSNs, Medical Records

.@MedStarHealth has issued the following patient notification: “After a thorough analysis of the files on MedStar Health’s systems, we determined that the files accessed by the unauthorized party contained patient information that included your name, date of birth, Social Security...

By Ted Hearn
Venice Keeps AI Chats Local, Adds Verifiable Encryption
SocialApr 11, 2026

Venice Keeps AI Chats Local, Adds Verifiable Encryption

"Every major AI platform — ChatGPT, Claude, Gemini, Grok, Perplexity — stores your conversations on centralized servers. That data can be reviewed, classified, subpoenaed, hacked, or sold. You're trusting the company, its employees, its vendors, and every government that asks. Venice...

By Erik Voorhees
Cloud Migration Shifts Risk, but Outages Spark Security Doubts
SocialApr 11, 2026

Cloud Migration Shifts Risk, but Outages Spark Security Doubts

Hosting data in-house carries risks due to limited cybersecurity investment. Moving to the cloud shifts risk to providers, but significant outages from major providers raise questions about security and stability. #CloudSecurity #CyberRisk https://t.co/mjMEZ0cpkz

By Eric Kimberling
Public API Keys Misused as Live Gemini AI Credentials
SocialApr 11, 2026

Public API Keys Misused as Live Gemini AI Credentials

Developers’ public API keys now function as live Gemini AI credentials, enabling attackers to run costly and unauthorized operations. https://t.co/Oo1InL5G8f

By TechRadar
AI Cuts BEC Dwell Time From Days to Minutes
SocialApr 11, 2026

AI Cuts BEC Dwell Time From Days to Minutes

Business email compromise dwell time: 24 days to 24 minutes. That is AI-powered incident response working. 85% of organizations still run manual security. Attackers move in 72 minutes. The math does not work.

By Yves Mulkers
Beware: Fake Login Alerts with Password Reset Links
SocialApr 11, 2026

Beware: Fake Login Alerts with Password Reset Links

Received an email from X warning you of new or unusual login attempts, with a handy 'change password' link? Beware, it's a slick new phishing attack that can trick even the most vigilant user. I've seen this with other sites...

By Dave Taylor
Anthropic's Mythos Triggers Unexpected Global Cybersecurity Reckoning
SocialApr 11, 2026

Anthropic's Mythos Triggers Unexpected Global Cybersecurity Reckoning

Anthropic’s Mythos Will Force a Cybersecurity Reckoning—Just Not the One You Think “This is an issue that involves all of the model developers. Our goal here is just to kick things off,” Graham said. Yes, including in China... https://t.co/Wsv6owE233

By Paul Triolo
Shared Observability Unites SOCs and DevOps
SocialApr 11, 2026

Shared Observability Unites SOCs and DevOps

RT SOCs and DevOps will need shared observability for agents: data access, tool calls, MCP interactions, and risk levels in one view. #Security #DevOps @Star_CIO https://t.co/tRGwCPc4Mb

By Isaac Sacolick
Storeless Password Manager Creates, Never Stores Credentials
SocialApr 11, 2026

Storeless Password Manager Creates, Never Stores Credentials

What happens when a password manager generates credentials on the fly and never saves them, anywhere, by design? https://spectrum.ieee.org/storeless-password-manager?share_id=9356368

By IEEE Spectrum Threads
AI Uncovers 27-Year-Old Bugs, Forces Wall Street Emergency
SocialApr 11, 2026

AI Uncovers 27-Year-Old Bugs, Forces Wall Street Emergency

The AI that found 27-year-old vulnerabilities no human ever caught before just forced an emergency meeting with every major Wall Street CEO https://t.co/SdPtfUg1Ic

By Tom Pick
Mythos AI Exposes Critical Flaws Across All OSes
SocialApr 11, 2026

Mythos AI Exposes Critical Flaws Across All OSes

Anthropic's Mythos AI Uncovered Serious Security Holes in Every Major OS and Browser by @EddyTheGent https://t.co/Wz76Q174Y8 https://t.co/kUAhNoKC9j

By Brian Ahier
New IDS Enhance SCADA Cybersecurity Protection
SocialApr 11, 2026

New IDS Enhance SCADA Cybersecurity Protection

New intrusion detection systems boost protection of SCADA systems against cyber threats #energysky -- via pv magazine global: https://t.co/110epGR3u2

By Tor “SolarFred” Valenza
GPT‑5.4's Hacking Prowess Heightens Security Urgency
SocialApr 10, 2026

GPT‑5.4's Hacking Prowess Heightens Security Urgency

GPT5.4 is apparently very effective at hacking as well. Makes proactively using these models to secure the world more urgent and important than we knew.

By Ramez Naam
Circle Must Act Fast to Prevent Massive Hack Losses
SocialApr 10, 2026

Circle Must Act Fast to Prevent Massive Hack Losses

Agreed & hope Circle reconsiders their stance quickly since it's a big error that will lead to many millions more USD lost in hacks before they change their mind. Even as a "competitor" with $frxUSD, we have 24/7 comm channels...

By Sam Kazemian
Concern: Chinese Hackers May Steal Advanced Orality Detection Tech
SocialApr 10, 2026

Concern: Chinese Hackers May Steal Advanced Orality Detection Tech

Yo @AnthropicAI I’m worried that Chinese hackers will steal our most advanced orality detection technology

By Joe Weisenthal
Treasury Pushes Anthropic, DoD Flags It as Risk
SocialApr 10, 2026

Treasury Pushes Anthropic, DoD Flags It as Risk

So the Treasury Department is encouraging banks to use and test Anthropic to prepare for new vulnerabilities… While the Department of War claims Anthropic is a “supply chain risk” for DoW and all their contractors…. Make that make sense https://t.co/vkDB1ezk88 https://t.co/jZD9h5yQVo

By Chris Fralic
Quantum Threat Looms: Crypto’s Upcoming Q-Day Explained
SocialApr 10, 2026

Quantum Threat Looms: Crypto’s Upcoming Q-Day Explained

So.. is q-day coming and is crypto cooked? definitely maybe. if you, like me, are not an expert in quantum computing and how it puts ALL blockchains at risk + want to know what changed in the last couple of weeks, then...

By Camila Russo
Seeking Real-World Feedback on SAFE GRC Platform
SocialApr 10, 2026

Seeking Real-World Feedback on SAFE GRC Platform

Do you use the SAFE GRC platform? Had a chance to see it at RSAC and was impressed but don't hear from many folks using it. Would love to hear real-world feedback from current users.

By Sean D. Mack
Pentesting: Human Insight Over Automated Scanners
SocialApr 10, 2026

Pentesting: Human Insight Over Automated Scanners

🤖🤖🤖🤖🤖🤖🤖🤖🤖🤖🤖🤖 Pentesting is not a scanner or a fuzzer - whether SAST, DAST, AI, deterministic or non-deterministic. Pentesting is a human * using those tools * to see if they can find a security problem that your teams and tools may...

By Teri Radichel
Robust Patch Management Needed Before AI Vulnerability Crisis
SocialApr 10, 2026

Robust Patch Management Needed Before AI Vulnerability Crisis

The technical debt repo man is coming, especially for those that don’t have robust patch creation & management — & it’s clear we can’t keep cranking out bugs in the 1st place. Stay hydrated, ops teams, & tip your doordashers...

By Katie Moussouris
Ultra-Powerful Vulnerability Model Reserved for Intelligence Agencies
SocialApr 10, 2026

Ultra-Powerful Vulnerability Model Reserved for Intelligence Agencies

We’ve created a model that we think could find and fix all the vulnerabilities in your application. You can’t have it. A model this powerful should only be used by the CIA and NSA to exploit your services.

By Whole Mars Catalog
Thousands of Gov Officials' Emails and Passwords Exposed Online
SocialApr 10, 2026

Thousands of Gov Officials' Emails and Passwords Exposed Online

The emails and plaintext passwords of thousands of government representatives have been found online. https://t.co/WaJd3bjpd5

By TechRadar
Compute Fuels Attacks, Committees Lag Defense Gap
SocialApr 10, 2026

Compute Fuels Attacks, Committees Lag Defense Gap

Offense scales with compute. Defense scales with committees. New piece on why the attacker-defender gap is widening faster than anything we've built to close it -- and what actually moves the needle. Link in bio or cje.io

By Casey Ellis
Legacy SDK Flaw Lets Attackers Steal Private Data
SocialApr 10, 2026

Legacy SDK Flaw Lets Attackers Steal Private Data

An outdated SDK carries a dangerous flaw that allows threat actors to steal private data. https://t.co/GKds3Ok79H

By TechRadar
Aave Achieves SOC 2 Compliance, Raising DeFi Standards
SocialApr 10, 2026

Aave Achieves SOC 2 Compliance, Raising DeFi Standards

Aave products and endpoints are now SOC 2 compliant, ensuring strong operational and security compliance, setting a new standard for DeFi application layer.

By Stani Kulechov
AI Journaling Demands Privacy as Core, Not Feature
SocialApr 10, 2026

AI Journaling Demands Privacy as Core, Not Feature

The most personal data you will ever generate deserves more than a terms of service. When you journal with AI, you are sharing things that, for a lot of people, nobody else hears outside of a therapist. That level of trust...

By Carolina Milanesi
Chrome's Device‑Bound Session Credentials Coming to macOS
SocialApr 10, 2026

Chrome's Device‑Bound Session Credentials Coming to macOS

New Device Bound Session Credentials feature for Google Chrome is also coming to macOS soon. https://t.co/AKyb6s77Fa

By TechRadar
Tor Builds RAM‑only Relays to Thwart Hardware Seizures
SocialApr 10, 2026

Tor Builds RAM‑only Relays to Thwart Hardware Seizures

The Tor Project is working with relay operators to develop "stateless" servers that run entirely in RAM. By forgetting all data upon reboot, these self-wiping relays will protect users and node operators from hardware seizures. https://t.co/C2MghAYpMj

By TechRadar
XRP More Quantum-Resistant Than Bitcoin
SocialApr 10, 2026

XRP More Quantum-Resistant Than Bitcoin

Experts say XRP is less vulnerable to quantum threats than Bitcoin, thanks to key rotation and escrow time-locks, exposing fewer accounts. Source: Coindesk https://t.co/I2y893X172

By Wendy O
Enterprises Store Data Right, but Lose Key Control
SocialApr 10, 2026

Enterprises Store Data Right, but Lose Key Control

Data sovereignty is not data residency. Three things have to align: where data is stored, how it is encrypted, who controls the encryption keys. Most enterprises get the first right. Almost none get the third.

By Yves Mulkers
Binance Helps Freeze $12M in Phishing Scam Funds
SocialApr 10, 2026

Binance Helps Freeze $12M in Phishing Scam Funds

BIG: 🚨 Binance supported a UK National Crime Agency–led operation targeting approval phishing scams, helping freeze $12M in illicit funds and protect over 20,000 victims across the UK, US, and Canada https://t.co/dB0eSANr9o

By Wendy O
Human Oversight Essential: AI Can’t Fully Guard Cybersecurity
SocialApr 10, 2026

Human Oversight Essential: AI Can’t Fully Guard Cybersecurity

Why We Can’t Let #AI Take the Wheel of Cyber Defense by Steve Durbin @SecurityWeek Learn more: https://t.co/m9sL8PCrDB #CyberSecurity #Infosec #IT #Technology https://t.co/VFKJzyJskQ

By Ron van Loon
Quantum‑Safe Bitcoin Transactions Now Possible with New Binding Method
SocialApr 10, 2026

Quantum‑Safe Bitcoin Transactions Now Possible with New Binding Method

ELI5 of @avihu28's brilliant paper: 1. In a Bitcoin tx there are two parts: (1) The first part used to show that you own a Bitcoin. That part can be made post-quantum safe. (2) The second part that says who controls it...

By Eli Ben-Sasson
Secure Your IoT Devices with Proven Cyber Defenses
SocialApr 10, 2026

Secure Your IoT Devices with Proven Cyber Defenses

How to Protect #IoT Devices from #CyberSecurity Threats by @antgrasso #InternetOfThings #Infosec #IT #Technology https://t.co/bHVcGm4rmX

By Ron van Loon
God‑mode RCE Is Just Access; Execution Needs Capability
SocialApr 10, 2026

God‑mode RCE Is Just Access; Execution Needs Capability

Even having a working 0day RCE god mode bug only gets you so far. You have initial access. Now what? What do you want to do and do you have the systems, processes, infrastructure and time to do it? Capability, opportunity,...

By The Grugq
Lack of Hardware Attestations Leaves Privacy Vulnerable
SocialApr 10, 2026

Lack of Hardware Attestations Leaves Privacy Vulnerable

If you inference provider doesn’t give you hardware attestations on what code was run and in turn that all your interaction were private - you are under attack.

By Illia Polosukhin
AI Boosts Productivity, but Prompt‑injection Risks Threaten Organizations
SocialApr 10, 2026

AI Boosts Productivity, but Prompt‑injection Risks Threaten Organizations

Wonder if the AI calculus becomes “12% productivity gains per employee with the tail risk of the org going under for a week if Ralph is the victim of a convincing prompt injection and inadvertently sends out internal info to...

By Luke Kawa
Mythos AI Finds 20 Zero‑days, Poised to Crack Smart Contracts
SocialApr 10, 2026

Mythos AI Finds 20 Zero‑days, Poised to Crack Smart Contracts

Anthropic's Mythos model is so powerful they restricted it to 12 partners and a $100M compute budget. It's already found 20 zero-days in legacy software. @kaiynne and @tayvano_ want to know when it finds the first one in a smart contract. New...

By Laura Shin
Fed and Hedge Fund Leader Warn of AI-Driven Cyber Threats
SocialApr 10, 2026

Fed and Hedge Fund Leader Warn of AI-Driven Cyber Threats

JUST IN: Scott Bessent and Jerome Powell called Wall Street execs to an urgent meeting over worries that Anthropic PBC's new AI model will ramp up cyber threats.

By David Gokhshtein
Shadow IT Evolves: From User Shortcuts to Autonomous Systems
SocialApr 9, 2026

Shadow IT Evolves: From User Shortcuts to Autonomous Systems

Shadow IT used to mean people using tools without approval. Now it can act on its own.

By Sean D. Mack
Mythos Cuts Cyber Attack Surface, Makes Exploits Scarcer
SocialApr 9, 2026

Mythos Cuts Cyber Attack Surface, Makes Exploits Scarcer

Concur. Mythos shrinks the total cyber attack surface area. There will be fewer exploits remaining, and those likely harder to find. And because model capabilities scale sub-linearly with both compute and training data, it likely takes a very large $$...

By Ramez Naam
DoD Switches Allies as Anthropic Unveils Dangerous AI Weapon
SocialApr 9, 2026

DoD Switches Allies as Anthropic Unveils Dangerous AI Weapon

DoD: Friendship ended with Anthropic. Now OpenAI is my best friend. [one month later] Anthropic: We’re pleased to announce the most powerful hacker capability ever created, able to discover and exploit thousands of critical 0days. Friends only release.

By The Grugq
New DeFi Security Premium Ratio Prices Protocol Risk
SocialApr 9, 2026

New DeFi Security Premium Ratio Prices Protocol Risk

DeFi has lost between $730M and $3.1B to exploits every single year since 2021. TVL has swung from $175B peak to $45B trough and back above $100B. The loss rate as a % of TVL is 1–3% / year depending on the...

By Santiago Santos
AI Cybersecurity Closes Gaps, Giving Defenders the Edge
SocialApr 9, 2026

AI Cybersecurity Closes Gaps, Giving Defenders the Edge

Yes. We're closing vulnerabilities that could have been (and may have been) exploited by bad actors already. AI cyber-security may well favor defenders in the large majority of cases.

By Ramez Naam
US to Weaponize Mythos, Consumers Lose Early Access
SocialApr 9, 2026

US to Weaponize Mythos, Consumers Lose Early Access

Im guessing the USA will use Mythos to decimate its adversaries and get all their secrets long before they ever have access to it. Get used to this format. The days of consumers getting the model at the same time as...

By NickPlaysCrypto
Google Resists Russia's VPN Crackdown, ZoogVPN Removed
SocialApr 9, 2026

Google Resists Russia's VPN Crackdown, ZoogVPN Removed

As Russia doubles down against VPN usage, Google seems to be resisting removal requests so far, despite a popular app, ZoogVPN, having reportedly been removed from Google Play. Here's all we know. https://t.co/KtMgSkFAfK

By TechRadar
Blockchain Boosts Data Security for Modern Enterprises
SocialApr 9, 2026

Blockchain Boosts Data Security for Modern Enterprises

How to Use #Blockchain for Enhanced #Data Security by @antgrasso #CyberSecurity #Infosec #IT #Technology https://t.co/qDcHN7LHpe

By Ron van Loon
WhatsApp Enhances Privacy, Yet Gaps Remain
SocialApr 9, 2026

WhatsApp Enhances Privacy, Yet Gaps Remain

WhatsApp might be improving its privacy options, but there's still more to be done. https://t.co/Ibrc6RGxAp

By TechRadar