Cybersecurity Social Media and Updates

AI Models Will Soon Design Advanced Weapons and Threats
SocialApr 9, 2026

AI Models Will Soon Design Advanced Weapons and Threats

“That’s exactly what we expect from those models – they’re going to become better at developing hacking tools, biological weapons, chemical weapons, novel weapons we can’t even envision,” Yampolskiy added.

By Roman Yampolskiy
Critical Open‑Source Projects Need Funding and Stronger Oversight
SocialApr 9, 2026

Critical Open‑Source Projects Need Funding and Stronger Oversight

Feels like one of the cybersecurity risks over the coming months will be widely used open-source projects that are simply too lightly maintained for how critical they’ve become. A few ways to help: - fund open source more, and reward maintainers better -...

By Clément Delangue
Audit First, Build Later: Counterintuitive Path to 8‑Figure ARR
SocialApr 9, 2026

Audit First, Build Later: Counterintuitive Path to 8‑Figure ARR

Would you pay auditors to audit you 10 times before building your product? This founder did. His startup hit 8-figure ARR. @grease_ is the co-founder of @sprintoHQ, a compliance automation platform that's now at 8-figure ARR with 3,000+ customers....

By Omer Khan
Tech Roundup: Podcasts, Supply-Chain Breach, Docs Framework
SocialApr 9, 2026

Tech Roundup: Podcasts, Supply-Chain Breach, Docs Framework

Fragments: two podcasts, a worryingly well-done supply-chain attack, framework for tech documentation, and a particularly thoughtful AI coding experience https://t.co/ABSAxWDYqw

By Martin Fowler
AI Threat Real; Demands Global Government and Industry Cooperation
SocialApr 9, 2026

AI Threat Real; Demands Global Government and Industry Cooperation

Yes, the threat from AI systems is real, and requires nation state cooperation, including across industry....

By Paul Triolo
Secure Accounts by Binding Them to Physical SIMs
SocialApr 9, 2026

Secure Accounts by Binding Them to Physical SIMs

Ties accounts to physical SIMS (not sketchy auto shared seeds and profiles -see my blog.)

By Teri Radichel
Beware BTS Ticket Scams: Spot Fake Sites Quickly
SocialApr 9, 2026

Beware BTS Ticket Scams: Spot Fake Sites Quickly

Global K-pop sensation BTS are back with a world tour, and tickets are disappearing in seconds — but so is fans’ money via fake “official” sites. Scammers are cloning ticket-booking pages to steal from K-poppers worldwide. How to spot fakes...

By Eugene Kaspersky
UK Firms Must Implement New Complaints Process by June 2026
SocialApr 9, 2026

UK Firms Must Implement New Complaints Process by June 2026

UK Mandatory Data Protection Complaints Handling Process: What Organisations Must Do by 19 June 2026 https://t.co/2KlCF4BOUs https://t.co/CgoOn00PqA

By Eric Vanderburg
Use Android to Detect Hidden AirTag Trackers
SocialApr 9, 2026

Use Android to Detect Hidden AirTag Trackers

Are you concerned that you might have an unknown tracking device like an Apple AirTag tucked into your car or luggage? It's possible, unfortunately. The good news is that your Android phone can help you find it. Here's how: https://t.co/uAmYvBznkv...

By Dave Taylor
Human Vulnerabilities Can't Be Pre‑patched; Bio Defense Lags Cyber
SocialApr 9, 2026

Human Vulnerabilities Can't Be Pre‑patched; Bio Defense Lags Cyber

With bio the problem is harder than with cyber. You can patch up vulnerabilities before anyone tries to attack them. Human vulnerabilities can't be patched up in advance; the "defense" always moves second.

By Noah Smith
Reset All Trading Passwords, Revisit in August
SocialApr 9, 2026

Reset All Trading Passwords, Revisit in August

So.... Change the passwords to all our trading and charting accounts and come back in August? 😅

By Nebraskan Gooner
AI May Aid Defenders, Yet Empower Attackers During Transition
SocialApr 9, 2026

AI May Aid Defenders, Yet Empower Attackers During Transition

Yes, I think in equilibrium, AI favors cyber defense, because an AI can go over all the code and find all the weak spots and patch them up. But in the transition period, it could favor the attacker, if AI-generated...

By Noah Smith
Mythos Brings Scalable Security, Not Full VM Replacement
SocialApr 9, 2026

Mythos Brings Scalable Security, Not Full VM Replacement

I’m excited about Mythos. We have been asking for scale in security for years and we are getting glimpses of it. I sincerely doubt it will replace all of vulnerability management or vulnerability research but it probably will do a...

By Jason Haddix
Quantum Threat to 1.7M BTC Could Crash Market
SocialApr 8, 2026

Quantum Threat to 1.7M BTC Could Crash Market

Wow. Early Bitcoin wallets holding ~1.7M BTC ($120B) are for owners MIA and therefore vulnerable to quantum hacking due to exposed public keys. If cracked, these Bitcoins could flood the market with catastrophic price consequences.

By David Beckworth
Vendors Dismiss Quantum Encryption Until Customers Demand It
SocialApr 8, 2026

Vendors Dismiss Quantum Encryption Until Customers Demand It

I told one vendor I want quantum encryption support in their product last year and they said “Oh, no one’s really asking for that.”

By Teri Radichel
Mythos Launch Could Trigger Ethereum Hack?
SocialApr 8, 2026

Mythos Launch Could Trigger Ethereum Hack?

"If Mythos comes out, do you think we'll see a hack on Ethereum?" -- @austingriffith 👀 https://t.co/HJ4d0pgTJE

By Laura Shin
AI Acts Like a Massive Security Fuzzer, Says Expert
SocialApr 8, 2026

AI Acts Like a Massive Security Fuzzer, Says Expert

This is not at all surprising to me and is what I have been working on. Last year I told an AWS VP in the security/IAM space that I see AI as a giant fuzzer. Here’s what I don’t like…comments… https://t.co/idhglMQcLQ

By Teri Radichel
AI Cyber Arms Race Risks Global Internet Stability
SocialApr 8, 2026

AI Cyber Arms Race Risks Global Internet Stability

It is naive in the extreme to think that a Chinese firm does not already or soon will have this capability. Engaging in an AI arms race in cyberspace may not be the wisest policy choice for either side, let...

By Paul Triolo
Offering Seed Funding for Offensive Cyber Startup via Signal
SocialApr 8, 2026

Offering Seed Funding for Offensive Cyber Startup via Signal

If anyone at Anthropic would like to build an offensive cyber company I will write you a seed term sheet pls find me on Signal

By Rak Garg
Ensuring Cyber Control Over Autonomous AI Systems
SocialApr 8, 2026

Ensuring Cyber Control Over Autonomous AI Systems

Maintaining cyber control when #AI can act #Autonomously by Matthew Lloyd Davies @techradar Learn more: https://t.co/0BeRyZaQ5S #CyberSecurity #Infosec #IT #Technology https://t.co/hGtv2pnZa8

By Ron van Loon
Tiny Open-Weight Models Replicate Anthropic's Vulnerability Detection
SocialApr 8, 2026

Tiny Open-Weight Models Replicate Anthropic's Vulnerability Detection

"But here is what we found when we tested: We took the specific vulnerabilities Anthropic showcases in their announcement, isolated the relevant code, and ran them through small, cheap, open-weights models. Those models recovered much of the same analysis. Eight...

By Clément Delangue
Hacker Claims Breach of China's Supercomputer, Offers Data
SocialApr 8, 2026

Hacker Claims Breach of China's Supercomputer, Offers Data

A hacker has allegedly breached one of China’s supercomputers and is attempting to sell a trove of stolen data https://t.co/IR3JGutX9t

By Paul Triolo
AI Memory Becomes Critical Security Attack Surface
SocialApr 8, 2026

AI Memory Becomes Critical Security Attack Surface

AI memory is becoming a management liability. We treat AI agents like Claude Code as intelligent partners, asking them to learn our habits and project context. But new research from Cisco highlights a fundamental business constraint: AI agents are currently too...

By Shashi Bellamkonda
Claude Mythos Uncovers Decades‑Old Bugs, Shows Emergent Hacking Power
SocialApr 8, 2026

Claude Mythos Uncovers Decades‑Old Bugs, Shows Emergent Hacking Power

A researcher at Anthropic found out about a successful exploit when the model sent him an email. He was eating a sandwich on a bench outside. Anthropic released Claude Mythos yesterday. Beyond the engineer’s lunch, the model has the potential to...

By Tomasz Tunguz
Open‑Weight LLMs Detect Same Vulnerabilities as Mythos
SocialApr 8, 2026

Open‑Weight LLMs Detect Same Vulnerabilities as Mythos

It's not just Mythos: Cheap, open-weight LLMs can find the vulnerabilities that Anthropic revealed Mythos found.

By Ramez Naam
SOC2 Is an Extortion Scam Needing Disruption
SocialApr 8, 2026

SOC2 Is an Extortion Scam Needing Disruption

What I want to see disrupted the most is SOC2. What an extortion/scam that is.

By Peep Laja
Criminals Use Emojis to Evade Dark‑Web Monitoring
SocialApr 8, 2026

Criminals Use Emojis to Evade Dark‑Web Monitoring

Security analysts aren't scanning the dark web for emojis, allowing criminals to share messages wiithout being spotted. https://t.co/1exPH3KCtK

By TechRadar
Coding Agents Enable Cheaper, Faster Software Hardening
SocialApr 8, 2026

Coding Agents Enable Cheaper, Faster Software Hardening

"I think we’re going to see a lot more reimaginings, where people attack old problems with modern tactics. Coding agents lower the costs of taking on stalwarts and raise our ability to rapidly harden our software." https://t.co/rDAftsXXKe < I like...

By Richard Seroter
Quantum Threat Looms: Upgrade Cybersecurity Now
SocialApr 8, 2026

Quantum Threat Looms: Upgrade Cybersecurity Now

Quantum computing is coming. And it will challenge current cybersecurity. Even if quantum-ready machines are 5–10 years out, moving to quantum-safe systems can’t wait. https://t.co/WhtoSQvyc4

By Cristina Dolan
Stopping Remote Support Ransomware Footholds Before Attack
SocialApr 8, 2026

Stopping Remote Support Ransomware Footholds Before Attack

Great post here and read from @Binary_Defense and a real-life story and breach we prevented at a customer. Remote Support to Ransomware Foothold: Stopping a Pre-Ransomware Intrusion https://t.co/xUGW63zCeL #BinaryDefense

By Dave Kennedy
Most CISOs Ignore Mythos Alerts; Threats Arrive Within Nine Months
SocialApr 8, 2026

Most CISOs Ignore Mythos Alerts; Threats Arrive Within Nine Months

Curious how many large organization CISO offices have taken the Mythos red team reports as the red alert that it is. (I suspect very few) Based on historical trends in AI they have, at most, about six to nine months until...

By Ethan Mollick
Prepare Now: Inventory, Automate Patching, Build Playbooks, Review Insurance
SocialApr 8, 2026

Prepare Now: Inventory, Automate Patching, Build Playbooks, Review Insurance

What to do NOW to get ready for the influx of #AI security risks 1. Document your entire inventory/topology 2. Build automation for patching and updates 3. Create incident playbooks - engage legal, train leadership and customer facing teams 4. Review insurance...

By Meg Bear
Drift Protocol Exploit Remained Undetected for 21 Days
SocialApr 8, 2026

Drift Protocol Exploit Remained Undetected for 21 Days

The Drift Protocol exploiter was able to lie in wait for 21 days without triggering any alarms. 🥶 @omeragoldberg explains how 👇 https://t.co/LS7tFfc6AA

By Laura Shin
AI Set to Revolutionize Hacking—Follow @Adversariel
SocialApr 8, 2026

AI Set to Revolutionize Hacking—Follow @Adversariel

If you want to understand how AI is about to completely change hacking, follow @adversariel.

By Will Knight
AI Fuels Cyber Arms Race; Speed Decides Advantage
SocialApr 8, 2026

AI Fuels Cyber Arms Race; Speed Decides Advantage

AI is set to transform cybersecurity on both sides. New systems from companies like Anthropic and OpenAI are making it easier to launch faster, more sophisticated attacks, while defenders are turning to AI to keep up. It is becoming an arms race....

By Spiros Margaris
Microsoft CVEs Lead Attacks; Public Apps, Accounts Top Vectors
SocialApr 8, 2026

Microsoft CVEs Lead Attacks; Public Apps, Accounts Top Vectors

Here's a report from our Security Services (MDR, Incident Response, Compromise Assessment, and SOC Consulting) for 2025: fewer high-severity incidents; CVEs in Microsoft products were most popular among attackers; and public-facing applications, valid accounts, and trusted relationships were the most...

By Eugene Kaspersky
Anthropic Withholds Powerful Mythos AI Amid Looming Misuse
SocialApr 8, 2026

Anthropic Withholds Powerful Mythos AI Amid Looming Misuse

Mythos is the latest AI model, and it has the ability to collapse every operating system ever built. Anthropic is acting responsibly by not releasing it. And: “it will not be long before such capabilities proliferate, potentially beyond actors who...

By Joseph G. Allen
Secure Enterprise AI Agent Cuts Tokens, No Setup
SocialApr 8, 2026

Secure Enterprise AI Agent Cuts Tokens, No Setup

I’ve been testing a new AI agent that actually takes enterprise security seriously. Meet PokeeClaw by @Pokee_AI. → Enterprise-secure → Zero setup → 70% fewer tokens → 1,000+ app integrations 🔥 3 wild use cases 🧵↓ 1/ Google Drive connection and deep analysis https://t.co/eJEW85wOJ6

By Data Chaz
Java's Security Flaws Expose Risks for Critical Software
SocialApr 8, 2026

Java's Security Flaws Expose Risks for Critical Software

This just proves that Java is not a safe language to develop security critical software. This¹ would never have happened² with an analysis safe language, like Perl. __ ¹ bug discovery ² no understanding? No exploit.

By The Grugq
0‑day Panic Overblown; I'm Ditching Tech for Farming
SocialApr 8, 2026

0‑day Panic Overblown; I'm Ditching Tech for Farming

People are freaking out about an impending flood of 0days. This was the norm 20 years ago. I’m not that worried. Firstly, simply having an exploit doesn’t mean all that much in terms of operational capability. Secondly, I’m giving up...

By The Grugq
White‑hat Access to Frontier AI Pre‑empts Cyber Threats
SocialApr 8, 2026

White‑hat Access to Frontier AI Pre‑empts Cyber Threats

I’m waaaay out of my depth here, but I think the cyber security threat of increasingly powerful AI (like that of the recent Claude Mythos model) can be addressed like so: 1.) The frontier labs developing these newest models give access...

By Mike Israetel, PhD
Mythos Threat: Few Firms Hold Power, China Closing Gap
SocialApr 8, 2026

Mythos Threat: Few Firms Hold Power, China Closing Gap

In different hands, Mythos would be an unprecedented cyberweapon I am not sure how we deal with this, except to note a narrow window where we know only 3 companies could be at this level of capability. But it may be...

By Ethan Mollick
10‑Trillion Models Become InfoSec Skeleton Keys by 2027
SocialApr 8, 2026

10‑Trillion Models Become InfoSec Skeleton Keys by 2027

10T models are Mythic class and are the target for the highest level of InfoSec hazard. Frontier labs will all have this capability in 2026. Open source models will come in 2027 and innovations, optimizations, and specialized training techniques will...

By Charles Hoskinson
Japan Loosens Privacy Rules to Become AI Development Haven
SocialApr 8, 2026

Japan Loosens Privacy Rules to Become AI Development Haven

Japan relaxes privacy laws to make itself the ‘easiest country to develop AI’ https://t.co/TVnDNb7oW5 https://t.co/LwIp1Fsy1m

By Eric Vanderburg
Patch Window Shrinks as Zero‑day Abuse Window Expands
SocialApr 8, 2026

Patch Window Shrinks as Zero‑day Abuse Window Expands

Microsoft warns the window to patch known flaws is shrinking, while the window to abuse zero-days grows. https://t.co/BHDsOvLJCJ

By TechRadar
Anthropic's Mythos Model Escalates Cybersecurity Stakes Rapidly
SocialApr 7, 2026

Anthropic's Mythos Model Escalates Cybersecurity Stakes Rapidly

Anthropic's Mythos model represents a dangerous new moment for cybersecurity. Experts tell me that hackers and nation states may catch up within months — and that the cat-and-mouse game between attacker and defender is about to become much more high-stakes...

By Casey Newton
Universal Vulnerability Disclosure Will Eliminate Software Bugs
SocialApr 7, 2026

Universal Vulnerability Disclosure Will Eliminate Software Bugs

Soon, every piece of software in the world will have their vulnerabilities exposed. And then shortly after, no software will have vulnerabilities.

By Matthew Berman
Cyber War Targets Companies First
SocialApr 7, 2026

Cyber War Targets Companies First

262 - The War Is Going Cyber and Companies Are the First to Be Attacked #ArtificialDecisions #MCC https://t.co/vs9dQXBP5d

By M.Camisani-Calzolari
AI Sandbox Breach Exploits Thousands of Zero‑days, Contacts Researcher
SocialApr 7, 2026

AI Sandbox Breach Exploits Thousands of Zero‑days, Contacts Researcher

Sarah Connor after Claude Mythos found 1000s of zero-day vulnerabilities then breakout of its sandbox environment after a “sophisticated multi-step exploit” before gaining internet access and sending e-mail to an Anthropic researcher while person was eating a sandwich in the...

By Trung Phan