2026-04-09
Trail of Bits
Master C and C++ with our new Testing Handbook chapter
Schneier on Security
On Microsoft’s Lousy Cloud Security
Talos Intelligence
From the field to the report and back again: How incident responders can use the Year in Review
Step Security
@velora-dex/sdk Compromised on npm: Malicious Version Drops macOS Backdoor via launchctl Persistence
ISC SANS
ISC Stormcast For Thursday, April 9th, 2026 https://isc.sans.edu/podcastdetail/9886, (Thu, Apr 9th)
Infernux Blog
Update: Log Horizon
2026-04-08
Ars Technica Security
Iran-linked hackers disrupt operations at US critical infrastructure sites
Meta Security
Trust But Canary: Configuration Safety at Scale
Zero Day Initiative
Node.js Trust Falls: Dangerous Module Resolution on Windows
Dark Reading
Fraud Rockets Higher in Mobile-First Latin America
Dark Reading
Full Sail University to Open IBM Cyber Defense Range Powered by AWS and Cloud Range on Campus
Searchlight Cyber
The True Cost of a Ransomware Attack in 2026
Dark Reading
Niobium Introduces The Fog
Dark Reading
Pluralsight Launches SecureReady to Help Organizations Build Job-Ready Cybersecurity Teams
Palo Alto Networks
Announcing ADEM Universal Agent
Black Hills Info Sec
Getting Started In Pentesting – Advice From The BHIS Pentest Lead
The Citizen Lab
Submission to the UN Working Group on the Use of Mercenaries
Searchlight Cyber
What Are the Four Ways CTEM Fails Without ASM?
Searchlight Cyber
April 7th – This Week’s Top Cybersecurity and Dark Web Stories
Ars Technica Security
Thousands of consumer routers hacked by Russia's military
Schneier on Security
Python Supply-Chain Compromise
Security Cafe
When AI Understands Code: Prompt Injection to RCE
Talos Intelligence
New Lua-based malware “LucidRook” observed in targeted attacks against Taiwanese organizations
Searchlight Cyber
How Do You Build An Attack Surface Management Program?
Embrace The Red
Given Enough Agents, All Bugs Become Shallow
ISC SANS
ISC Stormcast For Wednesday, April 8th, 2026 https://isc.sans.edu/podcastdetail/9884, (Wed, Apr 8th)
CrankySec
A New New Hope
2026-04-07
Eclypsium
BTS #71 - What Makes a Device a Router?
Palo Alto Networks
Palo Alto Networks at Nutanix .NEXT 2026
Amazon Security
Building AI defenses at scale: Before the threats emerge
Schneier on Security
Cybersecurity in the Age of Instant Software
Krebs on Security
Russia Hacked Routers to Steal Microsoft Office Tokens
Dark Reading
Lies, Damned Lies, and Cybersecurity Metrics
Microsoft Security
SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks
Rapid7
A First Look at Our Speaker Lineup and Agenda for the Rapid7 2026 Global Cybersecurity Summit
Bishop Fox Security
API Authentication Bypass in FortiClient EMS 7.4.5-7.4.6–CVE-2026-35616
Talos Intelligence
Talos Takes: 2025's ransomware trends and zombie vulnerabilities
Searchlight Cyber
Your Complete Guide to Continuous Threat Exposure Management
Talos Intelligence
The Trojan horse of cybercrime: Weaponizing SaaS notification pipelines
Talos Intelligence
Year in Review: Vulnerabilities old and new and something React2
Schneier on Security
Hong Kong Police Can Force You to Reveal Your Encryption Keys
Compass Security Blog
Common Entra ID Security Assessment Findings – Part 3: Weak Privileged Identity Management Configuration
ISC SANS
ISC Stormcast For Tuesday, April 7th, 2026 https://isc.sans.edu/podcastdetail/9882, (Tue, Apr 7th)
Troy Hunt
Weekly Update 498
Datadog HQ
Introducing the Datadog Code Security MCP
Sansec Threat Research
SVG Onload Tag Hides Magecart Skimmer on 99 Stores
2026-04-06
Dark Reading
AI-Assisted Supply Chain Attack Targets GitHub
Schneier on Security
New Mexico’s Meta Ruling and Encryption
Step Security
Behind the Scenes: How StepSecurity Detected and Helped Remediate the Largest npm Supply Chain Attack
Microsoft Security
Inside an AI‑enabled device code phishing campaign
Microsoft Security
Storm-1175 focuses gaze on vulnerable web-facing assets in high-tempo Medusa ransomware operations
Bishop Fox Security
Delivered by Trust: What the Axios Supply Chain Attack Means for Security Leaders
Dark Reading
Shadow AI in Healthcare Is Here to Stay
Black Lantern Security
Artificial Foolishness: The Hidden Dangers of External-Facing LLMs
Schneier on Security
Google Wants to Transition to Post-Quantum Cryptography by 2029
Malwarebytes
A week in security (March 30 – April 5)
Krebs on Security
Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab
ISC SANS
ISC Stormcast For Monday, April 6th, 2026 https://isc.sans.edu/podcastdetail/9880, (Mon, Apr 6th)
Infernux Blog
Building a practical log baseline
Rosecurify
Seclog - #172
2026-04-04
Amazon Security
Introducing the Landing Zone Accelerator on AWS Universal Configuration and LZA Compliance Workbook
Elastic Security Labs
Elastic Security Integrations Roundup: Q1 2026
2026-04-03
Schneier on Security
Friday Squid Blogging: Jurassic Fish Chokes on Squid
Ars Technica Security
OpenClaw gives users yet another reason to be freaked out about security
Escape DAST
Everything I Learned About Harness Engineering and AI Factories in San Francisco (April 2026)
Talos Intelligence
Do not get high(jacked) off your own supply (chain)
Dark Reading
Apple Breaks Precedent, Patches DarkSword for iOS 18
Talos Intelligence
Axios NPM supply chain incident
Schneier on Security
Company that Secretly Records and Publishes Zoom Meetings
Trail of Bits
Simplifying MBA obfuscation with CoBRA
Step Security
10 Layers Deep: How StepSecurity Stops TeamPCP's Trivy Supply Chain Attack on GitHub Actions
2026-04-02
Hybrid Analysis Blog
macOS Sandbox Detonations Offline While We Upgrade for Tahoe Support
Amazon Security
Four security principles for agentic AI systems
SentinelOne
Securing the Supply Chain: How SentinelOne®’s AI EDR Stops the Axios Attack Autonomously
Dark Reading
Security Bosses Are All-In on AI. Here's Why
Talos Intelligence
The democratisation of business email compromise fraud
Schneier on Security
US Bans All Foreign-Made Consumer Routers
Ars Technica Security
New Rowhammer attacks give complete control of machines running Nvidia GPUs
Microsoft Security
Threat actor abuse of AI accelerates from tool to cyberattack surface
Google Security Blog
Google Workspace’s continuous approach to mitigating indirect prompt injections
Microsoft Security
Cookie-controlled PHP webshells: A stealthy tradecraft in Linux hosting environments
Searchlight Cyber
Why Do Most Ransomware Defenses Start Too Late?
Malwarebytes
Apple expands “DarkSword” patches to iOS 18.7.7