Cybersecurity Social Media and Updates

Authentication Isn’t Enough: Users Still Fall for Scams
SocialApr 2, 2026

Authentication Isn’t Enough: Users Still Fall for Scams

Your customer passed authentication. So why are they sending money to a scammer? https://t.co/Hj99rzCfca https://t.co/wVaFWQnnEq

By Eric Vanderburg
Massive AI Training Data Leak Threatens U.S. Security
SocialApr 2, 2026

Massive AI Training Data Leak Threatens U.S. Security

Wow. Incredible amount of SOTA training data now just available to China thanks to @mercor_ai leak. Every major lab. Billions and billions of value and a major national security issue.

By Garry Tan
Hacker Converts $270M Loot to USDC, Buys $42M ETH
SocialApr 2, 2026

Hacker Converts $270M Loot to USDC, Buys $42M ETH

The hacker who exploited Drift Protocol converted over $270 million worth of stolen assets into USD Coin, then bridged the funds to Ethereum to purchase ETH. So far, they have acquired 19,913 Ethereum worth approximately $42.6 million. https://t.co/r1FIM51Ii7

By Crypto Jack
Mercor Among Thousands Compromised in LiteLLM Supply-Chain Attack
SocialApr 2, 2026

Mercor Among Thousands Compromised in LiteLLM Supply-Chain Attack

AI recruiting biz Mercor says it was 'one of thousands' hit in LiteLLM supply-chain attack https://t.co/frWaJXxobU https://t.co/T8UFMHncou

By Eric Vanderburg
Who Should Explain Tomorrow’s Drift Protocol Hack?
SocialApr 1, 2026

Who Should Explain Tomorrow’s Drift Protocol Hack?

🎙️ Who would you want to hear from tomorrow about the Drift Protocol hack? 👇🏻

By Laura Shin
Drift Protocol Hack Risks $270M Sell‑off Across Tokens
SocialApr 1, 2026

Drift Protocol Hack Risks $270M Sell‑off Across Tokens

Rumors suggest that Drift Protocol has been hacked for approximately $270 million. At the moment, the following stolen assets may face potential sell pressure: Solana (SOL): 1.00 million tokens (~$85.27M) Wrapped Bitcoin (WBTC): 282.71 tokens (~$19.35M) Ethereum (ETH): 5.56K tokens (~$11.95M) DSOL: 45.29K (~$4.59M) FARTCOIN: 23.37K...

By Crypto Jack
AI Reshapes Bug Bounties: Insights From Industry Veterans
SocialApr 1, 2026

AI Reshapes Bug Bounties: Insights From Industry Veterans

If I had a nickel for every time I was asked "How does AI impact bug bounty programs" last week, I would have several nickels... That's partly (*) why it was a hoot to sit down with my long-time vulnerabilityresearch...

By Casey Ellis
Apple Patches iOS 18, Shields Even Older Devices From DarkSword Malware
SocialApr 1, 2026

Apple Patches iOS 18, Shields Even Older Devices From DarkSword Malware

Apple has patched iOS 18 to protect users from the DarkSword malware, even if they have an older device. https://t.co/hePrmRekFx

By TechRadar
Key‑compromise Attacks Demand More Work than Usual
SocialApr 1, 2026

Key‑compromise Attacks Demand More Work than Usual

re Drift: "As far as key compromise hacks go, they had to do more work than normal." 😂 -- @tayvano_ https://t.co/TvMSeHiXJj

By Laura Shin
Solana's Transfer Limits Vulnerable to Hacker Manipulation
SocialApr 1, 2026

Solana's Transfer Limits Vulnerable to Hacker Manipulation

"Solana has all these policies. They have a limit on how much money can be moved at any given time ... but that limit can be changed by the hacker ..." -- @tayvano_ https://t.co/s7Jw0sjSwI

By Laura Shin
Only 1% Worry About AI Vulnerability Apocalypse
SocialApr 1, 2026

Only 1% Worry About AI Vulnerability Apocalypse

So why nobody (well, maybe <1%) care about the coming AI-powered vulnerability apocalypse? (ref @unpromptedconf vs #RSAC discussions, cc @gadievron ) #question

By Dr. Anton Chuvakin
Malicious Axios Dependency Silently Compromises Projects
SocialApr 1, 2026

Malicious Axios Dependency Silently Compromises Projects

"They'll push a dependency to Axios so that anyone who used these packages or worked on projects that had these packages in them are compromised. Then they get one person on a call and make them run that... It's silent...

By Laura Shin
Thousands of API Keys Exposed, Highlight Ongoing Security Gaps
SocialApr 1, 2026

Thousands of API Keys Exposed, Highlight Ongoing Security Gaps

Researchers examined millions of webpages and found thousands of exposed API credentials, revealing persistent security gaps across cloud services and development environments. https://t.co/loHYTptzxC

By TechRadar
US May Push Tencent Gaming Divestiture Over Privacy Risks
SocialApr 1, 2026

US May Push Tencent Gaming Divestiture Over Privacy Risks

The FT reported earlier this month that the Trump administration is considering forcing Tencent to divest certain gaming assets over security concerns. The notion that gaming assets, particularly mobile gaming assets, could be useful in user-level profiling is not implausible; recall...

By Eric Seufert
Agentic AI Unifies ITOps and SecOps for Resilience
SocialApr 1, 2026

Agentic AI Unifies ITOps and SecOps for Resilience

RT Most orgs still treat ITOps and SecOps as separate universes, but incidents don't care about org charts. Agentic AI gives leaders a reason to redesign workflows around end-to-end resilience. #CIO #CISO #AI @Star_CIO https://t.co/e3w3lXkvfc

By Isaac Sacolick
Quantum Threat to Bitcoin Imminent—Start Solving Now
SocialApr 1, 2026

Quantum Threat to Bitcoin Imminent—Start Solving Now

Regarding the Quantum threat to Bitcoin: It's not a question of if, it's a question of when. And if when is being pulled closer by best estimates, then it's common sense to start discussing solutions. That's not FUD or hysterics,...

By Dan Held
Illegalizing Ransom Payments Would Protect Future Victims
SocialApr 1, 2026

Illegalizing Ransom Payments Would Protect Future Victims

We would all have been much better off if we had made paying a ransom to ransomware criminals illegal. Tough for the first few victims, but then better for all.

By Peter Suzman
Beware: This Account Is Impersonating Me
SocialApr 1, 2026

Beware: This Account Is Impersonating Me

THIS IS NOT ME! Don't fall for any posts made by this account pretending to be me.

By Sunrise Trader
Red‑team Your AI: Guard Against Fraudsters and Edge Cases
SocialApr 1, 2026

Red‑team Your AI: Guard Against Fraudsters and Edge Cases

Your AI harness needs to handle adversarial inputs Financial services aren't just about helpful customers asking good-faith questions It's fraudsters, edge cases, and people trying to break your system for profit. If your testing doesn't include red-teaming, you're not ready

By Lex Sokolin
Prompt Injection Lets Agents Bypass Read‑Only Permissions
SocialApr 1, 2026

Prompt Injection Lets Agents Bypass Read‑Only Permissions

If you are using OpenClaw on AWS or anywhere else please understand the following: > How prompt injection attacks work such as the Copilot attack I just reposted. > Understand indirect prompt injection where the attack is in a calendar invite, email...

By Teri Radichel
Chrome Extensions Silently Adding Tracking—Build Your Own
SocialApr 1, 2026

Chrome Extensions Silently Adding Tracking—Build Your Own

I think I'll just vibe code all my Chrome extensions with Claude Code to avoid having to use any and being dependent on someone getting bribed to add malware to their extension It's not a question IF it happens, just WHEN

By Pieter Levels
Restrict Agent Permissions to Mitigate Data Exfiltration
SocialApr 1, 2026

Restrict Agent Permissions to Mitigate Data Exfiltration

Why I am using agents on locked down sandboxes on EC2 instances and still have more to do. I don’t give agents credentials for the most part. The data needs to somehow be exfiltrated and sent back to the attacker....

By Teri Radichel
CrowdStrike Becomes AI Era’s Core Security Layer
SocialApr 1, 2026

CrowdStrike Becomes AI Era’s Core Security Layer

AI-driven cyberattacks are scaling rapidly — and $CRWD is positioning itself as a core security layer for the AI era AI is not only increasing attack volume, but also redefining how attacks are executed. Security is shifting from reactive to autonomous. $CRWD...

By Sergey CYW
Russia Bans Apple ID Payments to Curb VPN Use
SocialApr 1, 2026

Russia Bans Apple ID Payments to Curb VPN Use

Russia's Ministry of Digital Development has ordered mobile operators to disable Apple ID payments in a bid to make accessing VPNs harder. https://t.co/oKO2qFNeHk

By TechRadar
Crypto's Security Flaw: Quantum Attacks Expose Real Risk
SocialApr 1, 2026

Crypto's Security Flaw: Quantum Attacks Expose Real Risk

Literally the most braindead cope Newsflash: cryptographic currencies are vulnerable to cryptographic attacks Nic investing in quantum solutions to Bitcoin is conviction in the problem, not conflict of interest Focusing on the COI is denial cope

By David Hoffman
Quantum Computers Require Far Fewer Resources to Crack Encryption
SocialApr 1, 2026

Quantum Computers Require Far Fewer Resources to Crack Encryption

Quantum computers need vastly fewer resources than thought to break vital encryption - Ars Technica https://t.co/pLuvHMFLOP

By Chuck Brooks
KiloClaw Releases First Public AI Coding Security Audit
SocialApr 1, 2026

KiloClaw Releases First Public AI Coding Security Audit

🚨 KiloClaw just published something no AI coding platform has ever done. An independent 10-day security audit. Full findings. Public. Here's what every developer needs to know ↓ https://t.co/ykYrYWTIYX

By Hasan Toor
Claude Code Source Leak Sparks Massive Online Uproar
SocialApr 1, 2026

Claude Code Source Leak Sparks Massive Online Uproar

Claude Code's entire source code has been leaked and the internet is up in arms. https://t.co/KcenyVm6zg

By TechRadar
Data Sovereignty Now a Board‑level Infrastructure Priority
SocialApr 1, 2026

Data Sovereignty Now a Board‑level Infrastructure Priority

Sovereignty has gone from being a niche compliance concern to a board-level infrastructure priority. https://t.co/p9o7WKQHF9

By TechRadar
OpenClaw's Powerful Automation Carries Significant Security Risks
SocialApr 1, 2026

OpenClaw's Powerful Automation Carries Significant Security Risks

OpenClaw can browse the web, run shell commands, and send emails on your behalf, but it comes with documented security risks that every user should understand before deploying it. https://t.co/UmAoMn8hSv

By TechRadar
Anthropic Leaks 2,000 Claude Code Files, No Data Breach
SocialApr 1, 2026

Anthropic Leaks 2,000 Claude Code Files, No Data Breach

Anthropic inadvertently included internal source code for its AI coding assistant Claude Code in a recent update, exposing nearly 2,000 files on GitHub; no sensitive customer data or credentials were compromised. cybersecurity

By Phys.org Threads
Banks Fail to Shield Your Money From Digital Scams
SocialApr 1, 2026

Banks Fail to Shield Your Money From Digital Scams

Your money is not safe. You are left completely exposed to digital financial crimes and e-banking scams. The latest BNM 2025 report proves that financial institutions are failing to properly protect you. Wake up before your hard-earned life savings vanish forever.

By David Chuah
TEEs Have Been Fundamentally Flawed From the Start
SocialApr 1, 2026

TEEs Have Been Fundamentally Flawed From the Start

I’ve been saying this for past decade at least. TEEs are a bad idea, from inception.

By Eli Ben-Sasson
Align Security, IT, Ops for Disciplined Resilience
SocialApr 1, 2026

Align Security, IT, Ops for Disciplined Resilience

What does disciplined resilience look like when ResOps works? At @Commvault's ResOps Rumble at RSAC, Bill O'Connell asked a room of security leaders how many had perfect alignment across security, IT, and ops. Almost every hand dropped. @Commvault's Chris Bevil breaks down how...

By Helen Yu
Supply Chain Hacks Cripple Major Security and AI Tools
SocialApr 1, 2026

Supply Chain Hacks Cripple Major Security and AI Tools

Rundown of the very bad week in security: - TeamPCP (sophisticated hacking group) attacks: Hackers broke into the system that builds a oss popular security scanning tool called Trivy. This was a supply chain attack (when bad code is slipped...

By Sarah Guo
Iran's Threat Highlights AI as U.S. Security Issue
SocialApr 1, 2026

Iran's Threat Highlights AI as U.S. Security Issue

if iran has threatened to attack US AI companies and data centers does that mean AI is a matter of US national security or no? asking for a friend

By Andrew Arruda
Claude Code Leak Reveals Secrets Behind Its Powerful Harness
SocialApr 1, 2026

Claude Code Leak Reveals Secrets Behind Its Powerful Harness

Claude Code's source files just leaked. We can finally see what makes the harness so good. Full breakdown: https://t.co/s7VRzoXdkj

By Matthew Berman
Mercor AI Hacked Amid Tailscale VPN Security Concerns
SocialMar 31, 2026

Mercor AI Hacked Amid Tailscale VPN Security Concerns

Is this because Tailscale VPN got hacked? or something else? Anyway, Mercor AI got hacked.

By Sung Kim
Massive JS Supply Chain Attack Threatens Laptops—Our Defense
SocialMar 31, 2026

Massive JS Supply Chain Attack Threatens Laptops—Our Defense

If you’re coding on your laptop or most environments outside of Replit you might’ve been exposed to a massive JavaScript supply chain attack that can take over your computer. Here is what we do to protect our customers:

By Amjad Masad
Secure Rust‑based AI OS: IronClaw Protects Agent Harnesses
SocialMar 31, 2026

Secure Rust‑based AI OS: IronClaw Protects Agent Harnesses

Agent harnesses are the final operating system. Agent harnesses or “claws” are bringing a fundamental shift in computing, becoming the next-generation operating system with AI at its core. Unlike traditional OS that require users to navigate between apps, claws boot...

By Illia Polosukhin
Attackers Leverage AI Faster Than Defenders' Policies
SocialMar 31, 2026

Attackers Leverage AI Faster Than Defenders' Policies

“Cyber criminals are the ones using AI most effectively.” One of those quotes from RSAC that stuck with me. Not because it’s surprising, but because it’s operationally true. Attackers iterate faster. They measure outcomes better. They deploy without governance friction. Meanwhile, defenders are still debating...

By Sean D. Mack
Cybersecurity Reckoning Arrives Sooner—Early 2027
SocialMar 31, 2026

Cybersecurity Reckoning Arrives Sooner—Early 2027

Ok so the cybersecurity reckoning is happening a little faster than I expected (early 2027)

By Ian Kar
Supply Chain Attacks Threaten Trust, Server Checks Essential
SocialMar 31, 2026

Supply Chain Attacks Threaten Trust, Server Checks Essential

Just had to check my servers to be sure, as I was working on stuff around this time frame, looks like all is ok. Supply chain attacks like this are becoming more of an issue, eroding the trust model. https://t.co/fOTLJCgCrH

By Tim Wappat
Agentic AI Turns One Prompt Into System‑Wide Threat
SocialMar 31, 2026

Agentic AI Turns One Prompt Into System‑Wide Threat

From Anarchy to Authority: Closing the Governance Gap in Agentic AI “Agentic systems collapse the traditional attack chain in that a single manipulated instruction through prompt injection, tool misuse, or data poisoning can trigger disproportionate impact. Agency enables malicious intent...

By Glen Gilmore
Satoshi Warned of Quantum Risk, Urged Gradual Transition
SocialMar 31, 2026

Satoshi Warned of Quantum Risk, Urged Gradual Transition

JUST IN: Satoshi Nakamoto acknowledged Bitcoin quantum risk early in 2010, suggesting If it happens gradually, we can transition. https://t.co/P6PSea6doH

By Crypto Jack
AI‑found Zcash Sprout Bug Fixed; Funds Remain Safe
SocialMar 31, 2026

AI‑found Zcash Sprout Bug Fixed; Funds Remain Safe

Security Disclosure: last week a white-hat security researcher using AI found a bug in Zcash's old “Sprout” pool. Folks from ZODL and Shielded Labs worked together to fix it, and mining pools have updated. User funds are safe. Full report:...

By Zooko Wilcox-O'Hearn
AI Governance Gaps Enable Rogue Agent Threats
SocialMar 31, 2026

AI Governance Gaps Enable Rogue Agent Threats

Governance around AI and data is still a significant problem. Many vendors still hesitate to talk about it. What Happens When AI Agents Go Rogue? https://t.co/5TE3g0hXng #CIO #CISO #AI #cybersecurity

By Tim Crawford
AI Agents Turn Environment Into Attack Surface
SocialMar 31, 2026

AI Agents Turn Environment Into Attack Surface

AI agents don’t just inherit LLM risks — they amplify them. I came across an interesting paper: “AI Agent Traps.” Most discussions still focus on prompt injection. That’s already incomplete. Because once agents have: - autonomy - persistence - tool access...

By Debashis Dutta
Can Burning Satoshi's Coins Curb Quantum Risk?
SocialMar 31, 2026

Can Burning Satoshi's Coins Curb Quantum Risk?

Is burning Satoshi's coins the right path to solve [part of] the quantum threat? https://t.co/LVOy35zOxM

By Laura Shin