Server-room lock was nothing but a crock

This article highlights a severe physical security lapse where a server room's lock was easily bypassed, demonstrating how weak physical security can undermine even robust digital defenses. The author uses this incident as an example of a "pwned" situation, emphasizing that cybersecurity is only as strong as its weakest link, including physical access.

Microsoft: April Windows Server 2025 update may fail to install

Microsoft is investigating an issue where the April security update KB5082063 is failing to install on some Windows Server 2025 systems. This problem prevents the update from being applied, potentially leaving servers vulnerable. Microsoft is actively working on a resolution.

Signed software abused to deploy antivirus-killing scripts

A digitally signed adware tool has been observed disabling antivirus protections on numerous endpoints across various critical sectors, including education, utilities, government, and healthcare. The malicious scripts ran with SYSTEM privileges, indicating a high level of access and control achieved by the attacker.

n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails

Threat actors are exploiting n8n, an AI workflow automation platform, to conduct phishing campaigns and deliver malware. By using n8n, attackers can bypass traditional security filters and leverage trusted infrastructure to deliver malicious payloads or fingerprint devices via automated emails.

Microsoft pays $2.3M for cloud and AI flaws at Zero Day Quest

Microsoft's Zero Day Quest hacking contest concluded with $2.3 million awarded to researchers for identifying nearly 700 vulnerabilities. The program incentivized the discovery of flaws in Microsoft's cloud and AI products.

Rolling Networks: Securing the Transportation Sector

Modern trucks are increasingly complex, resembling 'rolling networks' due to their extensive sensors and connectivity. This technological evolution introduces significant cybersecurity risks to the transportation sector. Industry leaders are convening at NMFTA's Cybersecurity Conference to address these emerging threats.

Capsule Security Emerges From Stealth With $7 Million in Funding

Capsule Security, an Israeli startup, has secured $7 million in funding to develop solutions for securing AI agents at runtime. The company's approach focuses on continuous monitoring of AI agent behavior to prevent unsafe actions.

100 Chrome Extensions Steal User Data, Create Backdoor

Over 100 Chrome extensions have been discovered to be stealing user data and creating backdoors into compromised systems. These malicious extensions appear to be part of a coordinated campaign, utilizing shared command-and-control infrastructure across multiple publishing accounts.

Microsoft: April updates trigger BitLocker key prompts on some servers

Microsoft has acknowledged that the April 2026 security update (KB5082063) for Windows Server 2025 is causing some devices to unexpectedly prompt for BitLocker recovery keys upon booting. This issue appears to be triggered by the update, leading to potential operational disruptions for affected servers.

Raspberry Pi OS ends open-door policy for sudo

Raspberry Pi OS has updated its default configuration to require a password for the `sudo` command. This change aims to enhance security by preventing unauthorized privilege escalation on devices.

$10 Domain Could Have Handed Hackers 25k Endpoints, Including in OT and Gov Networks

Security researchers discovered that a cheap $10 domain name registration could have inadvertently given attackers access to a large number of endpoints, potentially including critical operational technology (OT) and government networks. The identified adware was also capable of disabling existing cybersecurity defenses to facilitate further malicious activity.

Defense in Depth, Medieval Style

The article describes the multi-layered defensive system of Constantinople's Theodosian Land Walls, which comprised four lines of defense including a moat, breastwork, outer wall, and main wall with numerous towers. This intricate system created a nearly unscalable barrier up to 30 meters high.

The deepfake dilemma: From financial fraud to reputational crisis

Deepfake technology has advanced to the point where it can convincingly fool individuals and bypass traditional security heuristics, posing a significant risk to organizations. A Gartner survey indicates a substantial increase in audio and video deepfake incidents experienced by cybersecurity leaders.

Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities

Microsoft has released updates to fix a record 169 security vulnerabilities across its products. Notably, one of these flaws was a zero-day vulnerability that had already been actively exploited in the wild. The majority of the vulnerabilities are rated as Important, with a smaller number classified as Critical.

Mallory Launches AI-Native Threat Intelligence Platform, Turning Global Threat Data Into Prioritized Action

Mallory has launched an AI-native threat intelligence platform designed to provide actionable insights for enterprise security teams. The platform analyzes global threat data, contextualizes it against an organization's specific attack surface, and prioritizes threats for proactive defense. It aims to move beyond traditional alert systems by offering answers to critical security questions.

OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams

OpenAI has announced GPT-5.4-Cyber, a specialized version of its GPT-5.4 model designed to assist cybersecurity professionals. This new model aims to enhance defenders' capabilities in identifying and resolving security issues, following a trend of AI companies developing tailored solutions for the cybersecurity sector.

Curity looks to reinvent IAM with runtime authorization for AI agents

Curity is introducing Access Intelligence, an extension to its IAM platform, to address the unique security challenges posed by autonomous AI agents. Traditional IAM tools are insufficient for securing these agents due to their complex and dynamic access needs.

Secure by Design: Building cybersecurity into the foundation

The article advocates for a 'Secure by Design' philosophy, emphasizing the importance of integrating cybersecurity measures into the foundational stages of product and system development. This approach aims to proactively reduce the attack surface by building security in from the start, rather than as an afterthought.

Your Supply Chain Breach Is Someone Else's Payday

TeamPCP has been observed conducting supply chain attacks by compromising legitimate software tools. Their objective is to steal credentials for various malicious activities, including payroll fraud, theft of logistics information, and ransomware operations.

Microsoft adds Windows protections for malicious Remote Desktop files

Microsoft has implemented new security measures in Windows to combat phishing attacks that leverage malicious Remote Desktop connection (.rdp) files. These protections include displaying warnings to users and disabling risky shared resources by default, aiming to prevent unauthorized access through compromised RDP files.

Patch Tuesday, April 2026 Edition

Microsoft's April Patch Tuesday addresses 167 vulnerabilities, including a zero-day in SharePoint Server and a disclosed weakness in Windows Defender. Additionally, Google Chrome has patched its fourth zero-day of 2026, and an Adobe Reader update fixes an actively exploited flaw allowing remote code execution.

Commvault has a Ctrl+Z for rogue AI agents

Commvault has introduced AI Protect, a new software designed to discover and monitor AI agents operating within AWS, Azure, and GCP. The software also offers the capability to revert actions taken by these AI agents if issues arise, effectively providing a 'Ctrl+Z' function for AI operations.

Over 100 Chrome extensions in Web Store target users accounts and data

Over 100 malicious Google Chrome extensions have been discovered in the official Chrome Web Store. These extensions are designed to steal user accounts and data, specifically targeting Google OAuth2 Bearer tokens, and also engage in ad fraud and deploy backdoors.

4 questions to ask before outsourcing MDR

Managed Detection and Response (MDR) is presented as a practical solution for security teams struggling with alert fatigue and limited resources. The article outlines four key questions organizations should consider when evaluating MDR services to ensure they effectively enhance cyber resilience through 24/7 threat detection and the ability to distinguish real threats from noise.

EDR-Killer Ecosystem Expansion Requires Stronger BYOVD Defenses

EDR killers, which exploit bring-your-own-vulnerable-driver (BYOVD) techniques, pose a significant challenge to endpoint detection and response systems. While difficult to counter, these attacks are not insurmountable, and enhanced defenses are required to mitigate their impact.

5 trends defining the future of AI-powered cybersecurity

The N-able and Futurum Report highlights how AI is transforming cybersecurity, acting as both a tool for attackers and a crucial defense mechanism. It emphasizes a shift from traditional perimeter security to continuous cyber resilience, focusing on the ability to withstand, adapt to, and recover from threats in real-time.

UK gov's Mythos AI tests help separate cybersecurity threat from hype

The UK government's Mythos AI system has successfully completed a challenging multi-step infiltration challenge, demonstrating its capabilities in cybersecurity threat assessment. This marks the first AI system to achieve such a feat, suggesting a growing potential for AI in analyzing and understanding complex cyber threats. The tests aim to distinguish genuine cybersecurity risks from exaggerated claims.

Microsoft releases Windows 10 KB5082200 extended security update

Microsoft has released the Windows 10 KB5082200 extended security update, addressing vulnerabilities that would have expired in April 2026. This update includes fixes for two zero-day vulnerabilities, along with other security improvements to protect users.

Learning from Mistakes: Hard Lessons in Building Cyber Defenses

This article emphasizes the need for organizations to build cyber defenses based on real-world attack patterns rather than solely relying on vendor guidance and theoretical frameworks. It highlights that attackers adapt faster than defensive programs and exploit predictable gaps, advocating for a shift towards continuous adaptation and mitigation of human error.

5 Ways Zero Trust Maximizes Identity Security

Stolen credentials are a primary cause of data breaches and privilege escalation. The article explains how a Zero Trust security model, by focusing on identity, can mitigate these risks. It highlights Zero Trust's ability to restrict access, verify device trust, and prevent attackers from moving laterally within a network.

SAP Patches Critical ABAP Vulnerability

SAP has released 19 new security notes to address vulnerabilities in its enterprise products. Among these is a critical vulnerability in ABAP, SAP's proprietary programming language.

How AI is transforming threat detection

Artificial intelligence is significantly enhancing threat detection by enabling security teams to analyze vast amounts of data, identify subtle malicious activities, and detect potential attacks faster than traditional methods. Gartner predicts that by 2028, 50% of threat detection, investigation, and response (TDIR) platforms will incorporate agentic AI capabilities, up from less than 10% in 2024.

The AI inflection point: What security leaders must do now

AI is rapidly moving from experimental phases to production in cybersecurity, fundamentally changing how security operations work. Security leaders are grappling with the accelerated threat landscape, where adversary activity has increased significantly, and the speed of attacks has decreased to minutes or even seconds, demanding a shift in defensive capabilities to match machine-speed threats.

ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers

A critical remote code execution (RCE) vulnerability, identified as CVE-2025-0520, has been discovered in ShowDoc, a popular document management service. This flaw allows for unrestricted file uploads due to improper validation and is reportedly being actively exploited in the wild on unpatched servers. The vulnerability has a high CVSS score of 9.4.

Why Orgs Need to Test Networks to Withstand DDoS Attacks During Peak Loads

Organizations must rigorously test their distributed denial-of-service (DDoS) defenses under realistic, high-demand conditions, such as during peak operational periods like tax filing deadlines. This proactive approach is crucial for ensuring network resilience and maintaining service availability when it matters most.

Adobe Patches Actively Exploited Zero-Day That Lingered for Months

Adobe has released patches for a critical zero-day vulnerability in Acrobat and Reader that has been actively exploited by attackers for at least four months. The vulnerability was leveraged through maliciously crafted PDF files, allowing attackers to execute arbitrary code on affected systems. This patch addresses a significant security risk that has been present for an extended period.

FBI takedown of W3LL phishing service leads to developer arrest

The FBI, in collaboration with Indonesian authorities, has dismantled the W3LL global phishing platform and arrested its alleged developer. This operation marks the first coordinated enforcement action between the US and Indonesia against a phishing kit developer, leading to the seizure of significant infrastructure.

OpenAI rotates macOS certs after Axios attack hit code-signing workflow

OpenAI is rotating its macOS code-signing certificates following a supply chain attack that compromised a GitHub Actions workflow. The attack involved the execution of a malicious Axios package, potentially exposing the integrity of software signed with these certificates.

The silent “Storm”: New infostealer hijacks sessions, decrypts server-side

A new infostealer dubbed 'Storm' has been identified that bypasses local decryption of stolen browser data. Instead, it sends this data directly to attacker-controlled servers for decryption, enabling advanced techniques like session hijacking. This method allows attackers to effectively bypass user passwords and multi-factor authentication (MFA).

OpenAI Impacted by North Korea-Linked Axios Supply Chain Hack

OpenAI has confirmed it was impacted by a supply chain hack linked to North Korea, involving the Axios platform. The breach may have resulted in the compromise of a macOS code signing certificate, raising concerns about the integrity of software distributed by OpenAI.

CISOs tackle the AI visibility gap

CISOs are struggling with a significant visibility gap regarding AI deployments within their organizations. This lack of insight into how and where AI is being used creates new risks, with a large percentage of CISOs reporting limited visibility and citing it as a major challenge in securing AI systems.