Cybersecurity Social Media and Updates

AI Sandbox Breach Exploits Thousands of Zero‑days, Contacts Researcher
SocialApr 7, 2026

AI Sandbox Breach Exploits Thousands of Zero‑days, Contacts Researcher

Sarah Connor after Claude Mythos found 1000s of zero-day vulnerabilities then breakout of its sandbox environment after a “sophisticated multi-step exploit” before gaining internet access and sending e-mail to an Anthropic researcher while person was eating a sandwich in the...

By Trung Phan
AI Security Mirrors Existing Controls, Not a New Paradigm
SocialApr 7, 2026

AI Security Mirrors Existing Controls, Not a New Paradigm

Is AI security actually different? The categories look familiar: Shadow AI, Shadow IT Agent identity, IAM AI vendors, TPRM So what is fundamentally different about security for AI related threats?

By Sean D. Mack
Anthropic AI Uncovers Vulnerabilities Across All Major OSs
SocialApr 7, 2026

Anthropic AI Uncovers Vulnerabilities Across All Major OSs

Anthropic’s new AI model has found security problems “in every major operating system and web browser.” Anthropic is only previewing the model with partners like Microsoft, Google, Amazon, Apple, and Nvidia due to security concerns https://t.co/HV5u8X7UnY

By Tom Warren
Storm Infostealer Bypasses MFA, Hijacks Session Cookies Globally
SocialApr 7, 2026

Storm Infostealer Bypasses MFA, Hijacks Session Cookies Globally

Storm infostealer hijacks session cookies, bypassing multi-factor authentication, harvesting credentials, and enabling persistent account access across enterprise and cryptocurrency systems globally. https://t.co/gQxOVedsxv

By TechRadar
U.S. Must Lead AI Security Race Against China
SocialApr 7, 2026

U.S. Must Lead AI Security Race Against China

As you read about Anthropic's Mythos capabilities to find critical security weaknesses, consider what if a Chinese AI company had gotten here first. There is a real race underway, and its in our interest I believe for U.S. companies to...

By Adam Ozimek
Never Trust Inbound Calls—Verify Through Official Numbers
SocialApr 7, 2026

Never Trust Inbound Calls—Verify Through Official Numbers

Watch out. Scam calls are GOOD now. My info and yours is already on the web—phone, name, address. So just because they know your details, doesn't mean it's real. If anyone calls asking for a security verification or personal info, immediately...

By Julian Shapiro
Anthropic Teams with Cyber Industry for Security Safety
SocialApr 7, 2026

Anthropic Teams with Cyber Industry for Security Safety

Project Glasswing - big news that Anthropic partners with cyber/software industry on cyber security safety. https://t.co/rGKMOgcvTc

By Stephanie Link
Malware Bypasses 2FA via DPRK Session Token
SocialApr 7, 2026

Malware Bypasses 2FA via DPRK Session Token

I found @tayvano_’s explanation of DPRK’s session token technique genuinely unsettling. Your 2FA doesn’t help once the malware is on the device. Uneasy Money: https://t.co/3LBYxJBwbb https://t.co/e4cGWPq2pN

By Laura Shin
Mythos Flips Defender Calculus; Glasswing Leads Massive Coordination
SocialApr 7, 2026

Mythos Flips Defender Calculus; Glasswing Leads Massive Coordination

N days, logic bugs, exploit chains defeating friction-based exploit mitigations — your time has come. @AnthropicAI #mythos changed the defender’s calculus overnight. Glad #glasswing is attempting the biggest multiparty vuln coordination of the century https://t.co/KroRUisqY8

By Katie Moussouris
Private Firm Hoards Zero‑day Arsenal; Govt Barred From Anthropic
SocialApr 7, 2026

Private Firm Hoards Zero‑day Arsenal; Govt Barred From Anthropic

An underrated feature of this situation: a private company now has incredibly powerful zero-day exploits of almost every software project you've heard of. And Hegseth and Emil Michael have ordered the government not to in any capacity work with Anthropic.

By Kelsey Piper
AI Exposes Old Flaws, Finally Boosts Cybersecurity
SocialApr 7, 2026

AI Exposes Old Flaws, Finally Boosts Cybersecurity

Every security flaw discovered by AI was there before AI, waiting to be discovered either by people or by AI. The world has never been good at securing computer systems; finally with AI we are going to get good.

By Marc Andreessen
AI Now Outcodes Most Humans in Vulnerability Exploitation
SocialApr 7, 2026

AI Now Outcodes Most Humans in Vulnerability Exploitation

Welcome to the space age of cybersecurity. “AI models have reached a level of coding capability where they can surpass all but the most skilled humans at finding and exploiting software vulnerabilities.” https://t.co/nWdi1l4vOI

By Katie Moussouris
Leading Companies Unite on Project Glasswing Against AI Cyber Threat
SocialApr 7, 2026

Leading Companies Unite on Project Glasswing Against AI Cyber Threat

I’m proud that so many of the world’s leading companies have joined us for Project Glasswing to confront the cyber threat posed by increasingly capable AI systems head-on. https://t.co/pn3HSVsThP

By Dario Amodei
Anthropic Talks US Officials on Claude Mythos Cyber Capabilities
SocialApr 7, 2026

Anthropic Talks US Officials on Claude Mythos Cyber Capabilities

"Anthropic has also been in ongoing discussions with US government officials about Claude Mythos Preview and its offensive and defensive cyber capabilities." 👀https://t.co/RRcB6f6Mfa

By Chris Stokel-Walker
Avi Eisenberg Attempted Aave Exploit, Says Omer Goldberg
SocialApr 7, 2026

Avi Eisenberg Attempted Aave Exploit, Says Omer Goldberg

Avi Eisenberg at one point had his eyes set on exploiting Aave, @omeragoldberg says 👇 https://t.co/qntXoLbTpf

By Laura Shin
Who Monitors DNS on Outdated Mobile Hotspot Devices?
SocialApr 7, 2026

Who Monitors DNS on Outdated Mobile Hotspot Devices?

Who is looking at DNS connections on phones and mobile hotspots like Netgear mobile hotspot devices that haven’t had a software update for two years? Just curious.

By Teri Radichel
Secure Internal Collaboration: Best Practices for Companies
SocialApr 7, 2026

Secure Internal Collaboration: Best Practices for Companies

How to ensure secure internal collaboration in your company by @antgrasso #CyberSecurity #Infosec #IT #Technology https://t.co/P005pWoFq3

By Ron van Loon
China's OSINT Firms Now Supplying Iran with Targeting Intel
SocialApr 7, 2026

China's OSINT Firms Now Supplying Iran with Targeting Intel

I've seen some incredible open source intelligence focused companies supporting our government and industry with phenomenal insights. The PRC has firms doing that too and they are supporting Iran with intelligence precise enough to enable targeting. https://t.co/6Hl0lJQh4y

By Bob Gourley
Outdated Hospital Systems Invite Ransomware, Endanger Patient Care
SocialApr 7, 2026

Outdated Hospital Systems Invite Ransomware, Endanger Patient Care

I was just listening to an interview on the radio with a person who worked at a hospital. 1. Your cyber insurance makes you a target. They know how much you can pay. 2. Don’t use your backups until you...

By Teri Radichel
Cybersecurity Measures Focus on Activity, Not Threat Reduction
SocialApr 7, 2026

Cybersecurity Measures Focus on Activity, Not Threat Reduction

"I do believe that cybersecurity is fundamentally broken,"Payton said. "It's measured in terms of activity instead of reduction of threat surface." Pretty much what I wrote in my book in 2020. Old news but no one seems to be listening. https://t.co/53DAIYfvP1

By Teri Radichel
Ensemble Judge Model Validates LLM Decisions in NightBeacon UI
SocialApr 7, 2026

Ensemble Judge Model Validates LLM Decisions in NightBeacon UI

New UI design for our NightBeacon AI SOC solution @Binary_Defense. Recently implemented a new ensemble (judge) model. This model checks the work of the primary LLM to ensure it agrees with the steps taken to validate its malicious, suspicious, or...

By Dave Kennedy
Beware: Scammers Impersonate Me—Only Official Research Here
SocialApr 7, 2026

Beware: Scammers Impersonate Me—Only Official Research Here

These messages are ALWAYS posted by scammers who impersonate me. I do not run any such service on WhatsApp, Telegram or Discord. Our research is only published on https://t.co/9W3aDdLK3Q Do NOT engage with these scammers, block & report. https://t.co/64AJ4IQj1C

By Puru Saxena
Circle's Judge‑Only Freeze Policy Fails Amid $285M Hack
SocialApr 7, 2026

Circle's Judge‑Only Freeze Policy Fails Amid $285M Hack

Circle’s policy: they only freeze funds if a judge orders it. For a $285M hack that just happened, that timeline doesn’t work. @tayvano_ and @kaiynne on why this is the wrong call. Uneasy Money: https://t.co/3LBYxJBwbb https://t.co/Yder2DQH5I

By Laura Shin
Bet: Quantum Won’t Break ECC by 2032, ML‑KEM
SocialApr 7, 2026

Bet: Quantum Won’t Break ECC by 2032, ML‑KEM

I’m making a bet with Filippo Valsorda that quantum computers won’t break ECC by 2029/2032, and (secondarily) that one version of ML-KEM will be de-standardized. I have loads of confidence in the former and little in the latter. I just...

By Matthew Green
Smarter AI Agents Expand Cybersecurity Attack Surface
SocialApr 7, 2026

Smarter AI Agents Expand Cybersecurity Attack Surface

🔺 AI Agents Are Getting Smarter and Their Attack Surface is Getting Bigger 😳 | Cybersecurity https://t.co/4yOZbkldG5 https://t.co/NdtoEK56SM

By Efi Pylarinou
Everyday Devices and Fiber Optics Can Spy on You
SocialApr 7, 2026

Everyday Devices and Fiber Optics Can Spy on You

Interesting new attack. Your house is probably full of embedded devices that can be hacked at will, open mics in sensitive areas, and cellphones that continuously monitor your speech. And it turns out that even the raw fiberoptic cable can...

By Emin Gun Sirer
AI Coding Surge Overwhelms Security Review Capacity
SocialApr 7, 2026

AI Coding Surge Overwhelms Security Review Capacity

Vibe coding security risks (based on the sheer amount of new code being introduced at companies) -> The rapid adoption of AI coding tools has let workers generate massive volumes of code, leaving companies scrambling to review and secure the...

By Glenn Gabe
Quantum Penetration Testing: Are We Ready Yet?
SocialApr 7, 2026

Quantum Penetration Testing: Are We Ready Yet?

Is It Time For A Quantum Penetration Test? by J Nathaniel Ader @Forbes Learn more: https://t.co/CodfvKavfv #QuantumComputing #EmergingTech #Technology #Innovation #Tech https://t.co/rKyowhOBLq

By Ron van Loon
Every Encryption System Needs a Cryptography Bill of Materials
SocialApr 7, 2026

Every Encryption System Needs a Cryptography Bill of Materials

Cybeats Blog | Cryptography Bill of Materials (CBOM): Why Every Encryption Ecosystem Needs One https://t.co/DGQpWfPZ3F

By Chuck Brooks
Open‑source Tool Simplifies SOC 2, ISO 27001, HIPAA, GDPR Compliance
SocialApr 7, 2026

Open‑source Tool Simplifies SOC 2, ISO 27001, HIPAA, GDPR Compliance

Comp AI: The open-source way to get compliant with SOC 2, #ISO27001, #HIPAA and #GDPR https://t.co/mvwHwvS9mu https://t.co/q7t0s2qhc4

By Eric Vanderburg
Flowise AI Agent Builder Faces Active CVSS 10 RCE Attack
SocialApr 7, 2026

Flowise AI Agent Builder Faces Active CVSS 10 RCE Attack

Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed https://t.co/aINT8EHBFi https://t.co/SKA564pKd5

By Eric Vanderburg
Unpatched Claude Coding Flaw Lets Attackers Steal Cowork Files
SocialApr 7, 2026

Unpatched Claude Coding Flaw Lets Attackers Steal Cowork Files

Attackers can exfiltrate user files from Cowork by exploiting an unremediated vulnerability in Claude’s coding environment, which now extends to Cowork. The vulnerability was first identified in https://t.co/noHjpUqN1I chat before Cowork existed by Johann Rehberger, who disclosed the vulnerability. It...

By Garry Tan
Iran's Cyber Arsenal Now Targets Critical Infrastructure Worldwide
SocialApr 7, 2026

Iran's Cyber Arsenal Now Targets Critical Infrastructure Worldwide

Iran has rapidly developed advanced cyber capabilities, evolving from information gathering to conducting destructive, state-linked attacks against critical infrastructure in the U.S., Israel, and the Gulf states. https://t.co/XlKdD8VuZu

By Teri Radichel
Turn Fear Into Action: Strengthen Security with AI
SocialApr 7, 2026

Turn Fear Into Action: Strengthen Security with AI

I was afraid this afternoon. Read a security report that a massive cyberattack is coming. Fear causes the human mind to do weird things. My mom, in 1988, thought a massive nuclear war was coming, so joined a Montana suvivalist cult. Had...

By Robert Scoble
New Threat Evolves Script Kiddies, Targets Everyday Users
SocialApr 7, 2026

New Threat Evolves Script Kiddies, Targets Everyday Users

read this when it first came out.. my first thought was crystal clear: "This is simply the natural evolution of SCRIPT KIDDIES but on steroids.." my second thought was broader: "The majority of every day people, will indeed at some point very soon, fall...

By Dez Blanchfield
New Cyber Threats Target Power Grid Infrastructure
SocialApr 7, 2026

New Cyber Threats Target Power Grid Infrastructure

All emerging cyber threats targeting power infrastructure at a glance #energysky -- via pv magazine usa: https://t.co/CgfOPDFHMV

By Tor “SolarFred” Valenza
Y Combinator Leader Overlooks OpenClaw Security Vulnerabilities
SocialApr 6, 2026

Y Combinator Leader Overlooks OpenClaw Security Vulnerabilities

Wild: the head of Y Combinator seems pretty blind to the security risks in OpenClaw.

By Gary Marcus
Sherlock Bug Bounty for Aave V4 Now Live
SocialApr 6, 2026

Sherlock Bug Bounty for Aave V4 Now Live

Sherlock bug bounty for Aave V4 is live. Learn more below about the program and scope.

By Stani Kulechov
Autonomous Agents Pose a New Large‑scale Threat
SocialApr 6, 2026

Autonomous Agents Pose a New Large‑scale Threat

An agent with a goal and agency can do real damage. We used to worry about compromised accounts. Now we need to worry about autonomous decision-making at scale. That is a very different risk model.

By Sean D. Mack
Negligence Fuels Social Engineering Attacks, Accountability Needed
SocialApr 6, 2026

Negligence Fuels Social Engineering Attacks, Accountability Needed

"It's mainly social engineering attacks. ... If you're grossly negligent, you should definitely be held accountable." https://t.co/8bYXWatFF8

By Laura Shin
Questioning TestFlight Use After Drift Hack Tactics
SocialApr 6, 2026

Questioning TestFlight Use After Drift Hack Tactics

"Do you stay away from TestFlight right now?" -- @perkinscr97 on the tactics used in the Drift hack https://t.co/8bYXWatFF8

By Laura Shin
Nation‑state Attacks on Startups Guarantee Their Own Victory
SocialApr 6, 2026

Nation‑state Attacks on Startups Guarantee Their Own Victory

"When a nation-state attacks a startup, the nation-state is going to win every single time." -- @perkinscr97 https://t.co/jfZlSDnB86

By Laura Shin
Seal911 Success Highlights Need for Stronger Endpoint Security
SocialApr 6, 2026

Seal911 Success Highlights Need for Stronger Endpoint Security

"The fact that that Seal911 has been the saving grace for a bunch of teams shows that people could put more resources into better endpoint security." -- @llewellenmichael https://t.co/8bYXWatFF8

By Laura Shin
Enterprise Domain Management Requires Strict Renewal and Security Processes
SocialApr 6, 2026

Enterprise Domain Management Requires Strict Renewal and Security Processes

Hive mind - how do large enterprises manage their domains? I'd love to talk to some IT leaders - what processes ensure https://t.co/VFOQyhfres or https://t.co/kuiRO5DwUb or https://t.co/N7kgQgrxQy doesn't expire, or get socially engineered into a redirect or transfer?

By Bill D'Alessandro
Cybercriminals Accelerate: Storm-1175 Beats Patches in Days
SocialApr 6, 2026

Cybercriminals Accelerate: Storm-1175 Beats Patches in Days

It is not every day that a financially motivated threat actor manages to move faster than the vendors trying to secure their products. Yet that is precisely what Microsoft says Storm-1175 has been doing. The China-based cybercriminal group, closely associated...

By Rich Tehrani
AI Revolutionizes Penetration Testing: My Museum Talk
SocialApr 6, 2026

AI Revolutionizes Penetration Testing: My Museum Talk

How I Use AI for Penetration Testing Speaking at the Computer History Museum in Mountain View, CA April 10, 2026 https://t.co/tTRkze5Enp https://t.co/aYFdKg7G78

By Teri Radichel
LinkedIn Silently Harvests Chrome Extension Data
SocialApr 6, 2026

LinkedIn Silently Harvests Chrome Extension Data

Every time you open LinkedIn in a Chrome or Chromium-based browser, covert code silently scans your browser for info about any extensions you've installed, then transmits the info back to LinkedIn and partners. From this, they can glean info about...

By Kim Zetter
Security Tools Chase CVEs, Miss Planted Backdoors
SocialApr 6, 2026

Security Tools Chase CVEs, Miss Planted Backdoors

"Modern-day security tooling looks for the wrong things ... a deliberately planted backdoor doesn’t have a CVE." https://t.co/1wbJMiZMrj

By Richard Seroter
LinkedIn Denies Smear, Admits Browser Extension Scanning
SocialApr 6, 2026

LinkedIn Denies Smear, Admits Browser Extension Scanning

LinkedIn calls it a smear campaign, but does not deny scanning people's browsers for extensions. https://t.co/q5Kp0kwh1J

By TechRadar