2026-04-03
Schneier on Security
Friday Squid Blogging: Jurassic Fish Chokes on Squid
Ars Technica Security
OpenClaw gives users yet another reason to be freaked out about security
Escape DAST
Everything I Learned About Harness Engineering and AI Factories in San Francisco (April 2026)
Talos Intelligence
Do not get high(jacked) off your own supply (chain)
Dark Reading
Apple Breaks Precedent, Patches DarkSword for iOS 18
Talos Intelligence
Axios NPM supply chain incident
Schneier on Security
Company that Secretly Records and Publishes Zoom Meetings
Trail of Bits
Simplifying MBA obfuscation with CoBRA
Step Security
10 Layers Deep: How StepSecurity Stops TeamPCP's Trivy Supply Chain Attack on GitHub Actions
ISC SANS
ISC Stormcast For Friday, April 3rd, 2026 https://isc.sans.edu/podcastdetail/9878, (Fri, Apr 3rd)
2026-04-02
Hybrid Analysis Blog
macOS Sandbox Detonations Offline While We Upgrade for Tahoe Support
Amazon Security
Four security principles for agentic AI systems
SentinelOne
Securing the Supply Chain: How SentinelOne®’s AI EDR Stops the Axios Attack Autonomously
Dark Reading
Security Bosses Are All-In on AI. Here's Why
Talos Intelligence
The democratisation of business email compromise fraud
Schneier on Security
US Bans All Foreign-Made Consumer Routers
Ars Technica Security
New Rowhammer attacks give complete control of machines running Nvidia GPUs
Microsoft Security
Threat actor abuse of AI accelerates from tool to cyberattack surface
Google Security Blog
Google Workspace’s continuous approach to mitigating indirect prompt injections
Microsoft Security
Cookie-controlled PHP webshells: A stealthy tradecraft in Linux hosting environments
Searchlight Cyber
Why Do Most Ransomware Defenses Start Too Late?
Malwarebytes
Apple expands “DarkSword” patches to iOS 18.7.7
Talos Intelligence
[Video] The TTP Ep 21: When Attackers Become Trusted Users
Cloudflare
Why we're rethinking cache for the AI era
Dark Reading
Bank Trojan 'Casbaneiro' Worms Through Latin America
Schneier on Security
Possible US Government iPhone Hacking Tool Leaked
Talos Intelligence
UAT-10608: Inside a large-scale automated credential harvesting operation targeting web applications
Talos Intelligence
Qilin EDR killer infection chain
Talos Intelligence
Inside the Talos 2025 Year in Review: A discussion on what the data means for defenders
watchTowr Labs
You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 & CVE-2026-2701)
Talos Intelligence
An overview of ransomware threats in Japan in 2025 and early detection insights from Qilin cases
Step Security
Malicious IoliteLabs VSCode Extensions Target Solidity Developers on Windows, macOS, and Linux with Backdoor
ISC SANS
ISC Stormcast For Thursday, April 2nd, 2026 https://isc.sans.edu/podcastdetail/9876, (Thu, Apr 2nd)
Elastic Security Labs
How we caught the Axios supply chain attack
Elastic Security Labs
Hooked on Linux: Rootkit Detection Engineering
Elastic Security Labs
Prioritizing Alerts Triage with Higher-Order Detection Rules
2026-04-01
itm4n's Blog
BitLocker's Little Secrets: The Undocumented FVE API
Microsoft Security
Mitigating the Axios npm supply chain compromise
Github Security Blog
Securing the open source supply chain across GitHub
Schneier on Security
Is “Hackback” Official US Cybersecurity Strategy?
The Citizen Lab
The Perils of Privatized Cyberwarfare
Black Hills Info Sec
Cloud Security: Tips and Resources for Securing the Cloud
Offensive Security
Shadow AI: How Unsanctioned Tools Create Invisible Risk
SentinelOne
The Implementation Blind Spot | Why Organizations Are Confusing Temporary Friction with Permanent Safety
Searchlight Cyber
The 2026 ‘Forum Wars’: Deconstructing the BreachForums Drama
Trail of Bits
Mutation testing for the agentic era
Dark Reading
Are We Training AI Too Late?
Searchlight Cyber
March 30th – This Week’s Top Cybersecurity and Dark Web Stories
Schneier on Security
A Taxonomy of Cognitive Security
Palo Alto Networks
Closing the Gap by Enhancing Visibility and Mitigating Risks
ISC SANS
ISC Stormcast For Wednesday, April 1st, 2026 https://isc.sans.edu/podcastdetail/9874, (Wed, Apr 1st)
Elastic Security Labs
Inside the Axios supply chain compromise - one RAT to rule them all
Elastic Security Labs
Elastic releases detections for the Axios supply chain compromise
Infernux Blog
Tool Release: Log Horizon
2026-03-31
Dark Reading
Axios NPM Package Compromised in Precision Attack
Amazon Security
New compliance guide available: ISO/IEC 27001:2022 on AWS
Ars Technica Security
Quantum computers need vastly fewer resources than thought to break vital encryption
Microsoft Security
The threat to critical infrastructure has changed. Has your readiness?
Google Security Blog
VRP 2025 Year in Review
Meta Security
Meta Adaptive Ranking Model: Bending the Inference Scaling Curve to Serve LLM-Scale Models for Ads
Microsoft Security
Applying security fundamentals to AI: Practical advice for CISOs
Malwarebytes
Axios supply chain attack chops away at npm trust
Microsoft Security
WhatsApp malware campaign delivers VBScript and MSI backdoors
Ars Technica Security
Iran's hackers are on the offensive against the US and Israel
Cloudflare
Introducing Programmable Flow Protection: custom DDoS mitigation logic for Magic Transit customers
Palo Alto Networks
Five Browser and AI Security Questions Keeping CxOs up at Night
Schneier on Security
Inventors of Quantum Cryptography Win Turing Award
Trail of Bits
How we made Trail of Bits AI-native (so far)
Talos Intelligence
Ransomware in 2025: Blending in is the strategy
Mend
Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install
Compass Security Blog
Common Entra ID Security Assessment Findings – Part 2: Privileged Unprotected Groups
ISC SANS
ISC Stormcast For Tuesday, March 31st, 2026 https://isc.sans.edu/podcastdetail/9872, (Tue, Mar 31st)
Troy Hunt
Weekly Update 497
Elastic Security Labs
Fake Installers to Monero: A Multi-Tool Mining Operation
2026-03-30
Dark Reading
AI-Driven Code Surge Is Forcing a Rethink of AppSec
Black Lantern Security
red-run 2.0: Agent Teams
Meta Security
AI for American-Produced Cement and Concrete
Dark Reading
Storm Brews Over Critical, No-Click Telegram Flaw
Google Safety & Security
Evolving expectations of what’s possible
Offensive Security
OffSec and Deloitte Portugal Announces Strategic Partnership
Schneier on Security
Apple’s Camera Indicator Lights
Malwarebytes
A week in security (March 23 – March 29)
Infernux Blog
Upcoming Microsoft Sentinel features
Rosecurify
Seclog - #171
Sansec Threat Research
Mass PolyShell attack wave hits 471 stores in one hour
2026-03-29
watchTowr Labs
Please, We Beg, Just One Weekend Free Of Appliances (Citrix NetScaler CVE-2026-3055 Memory Overread Part 2)
Infernux Blog
Privileged Access 101 in Entra ID
2026-03-28
watchTowr Labs
The Sequels Are Never As Good, But We're Still In Pain (Citrix NetScaler CVE-2026-3055 Memory Overread)