2026-04-21
Praetorian
500,000 Vulnerabilities, 14 That Matter: How Exploit Chain Analysis Cuts Through the Noise
Krebs on Security
‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty
Google Safety & Security
3 new ways Ads Advisor is making Google Ads safer and faster
Searchlight Cyber
What is Preemptive Threat Exposure Management (PTEM)?
Cloudflare
Moving past bots vs. humans
Ars Technica Security
Contrary to popular superstition, AES 128 is just fine in a post-quantum world
Talos Intelligence
[Podcast] It's not you, it's your printer: State-sponsored and phishing threats in 2025
Talos Intelligence
Phishing and MFA exploitation: Targeting the keys to the kingdom
Schneier on Security
Mexican Surveillance Company
Talos Intelligence
Bad Apples: Weaponizing native macOS primitives for movement and execution
ISC SANS
ISC Stormcast For Tuesday, April 21st, 2026 https://isc.sans.edu/podcastdetail/9900, (Tue, Apr 21st)
2026-04-20
Leviathan Security
The Power of Good Privacy Practices
Dark Reading
Vercel Employee's AI Tool Access Led to Data Breach
Rapid7
Project Glasswing and the Next Challenge for Defenders: Turning Faster Discovery into Faster Action
Microsoft Security
Making opportunistic cyberattacks harder by design
Amazon Security
How to clone an AWS CloudHSM cluster across Regions
Dark Reading
WhatsApp Leaks User Metadata to Attackers
Malwarebytes
Mythos: An AI tool too powerful for public release
Cloudflare
Orchestrating AI Code Review at scale
Sicuranext Blog
A nice approach to AWS security group management
Sicuranext Blog
A nice approach to AWS security group management
Searchlight Cyber
The Intelligence Hidden in Ransomware Data
Schneier on Security
Is “Satoshi Nakamoto” Really Adam Back?
Malwarebytes
A week in security (April 13 – April 19)
ISC SANS
ISC Stormcast For Monday, April 20th, 2026 https://isc.sans.edu/podcastdetail/9898, (Mon, Apr 20th)
Conduition
Pruning Hypertrees for the Lax and Lazy
Rosecurify
Seclog - #174
2026-04-18
Microsoft Security
Cross‑tenant helpdesk impersonation to data exfiltration: A human-operated intrusion playbook
2026-04-17
Embrace The Red
Breaking Opus 4.7 with ChatGPT (Hacking Claude's Memory)
Ars Technica Security
US-sanctioned currency exchange says $15 million heist done by "unfriendly states"
Schneier on Security
Friday Squid Blogging: New Giant Squid Video
Palo Alto Networks
The AI Ecosystem Edge — Introducing Our Frontier AI Alliance
Microsoft Security
Containing a domain compromise: How predictive shielding shut down lateral movement
Dark Reading
Every Old Vulnerability Is Now an AI Vulnerability
Malwarebytes
This old-school scam is still working
Escape DAST
Top XBOW Alternatives in 2026
Palo Alto Networks
Defender's Guide to the Frontier AI Impact on Cybersecurity
Palo Alto Networks
Introducing Unit 42 Frontier AI Defense
Cloudflare
Agents Week: network performance update
Schneier on Security
Mythos and Cybersecurity
Ars Technica Security
Recent advances push Big Tech closer to the Q-Day danger zone
Searchlight Cyber
Explore the Data Breach Dashboard in Cerberus
Searchlight Cyber
Faster speed to triage with improved detail view in DarkIQ
ISC SANS
ISC Stormcast For Friday, April 17th, 2026 https://isc.sans.edu/podcastdetail/9896, (Fri, Apr 17th)
Datadog HQ
Every team should be A/B testing
2026-04-16
Talos Intelligence
Foxit, LibRaw vulnerabilities
Talos Intelligence
The Q1 vulnerability pulse
Microsoft Security
Building your cryptographic inventory: A customer strategy for cryptographic posture management
Microsoft Security
Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise
Cloudflare
Artifacts: versioned storage that speaks Git
Bishop Fox Security
Taking Maestro in Stride: AI Threat Modeling Frameworks
Malwarebytes
Browser Guard gets even better with Access Control
Talos Intelligence
PowMix botnet targets Czech workforce
Talos Intelligence
More than pretty pictures: Wendy Bishop on visual storytelling in tech
Schneier on Security
Human Trust of AI Agents
Palo Alto Networks
Securing the UK’s Digital Future
TrustedSec
Dungeons and Daemons
Fastly
Adapting in the Era of AI
2026-04-15
Dark Reading
Critical MCP Integration Flaw Puts NGINX at Risk
Ars Technica Security
"TotalRecall Reloaded" tool finds a side entrance to Windows 11's Recall database
Eye Security Research
Making AI Agents Work in Europe’s Regulatory Reality
Microsoft Security
Incident response for AI: Same fire, different fuel
Black Hills Info Sec
Signed, Trusted, and Abused: Proxy Execution via WebView2
Searchlight Cyber
Vulnerability Management: How to Prioritize Real Threats Over Noise
Dark Reading
Microsoft, Salesforce Patch AI Agent Data Leak Flaws
Schneier on Security
Defense in Depth, Medieval Style
Talos Intelligence
The n8n n8mare: How threat actors are misusing AI workflow automation
Searchlight Cyber
April 14th – This Week’s Top Cybersecurity and Dark Web Stories
CrankySec
Smash the glass wing
2026-04-14
Rapid7
Patch Tuesday - April 2026
Krebs on Security
Patch Tuesday, April 2026 Edition
The Citizen Lab
Beijing Codifies Repression of Overseas Activists
Talos Intelligence
Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities
Ars Technica Security
UK gov's Mythos AI tests help separate cybersecurity threat from hype
Github Security Blog
Hack the AI agent: Build agentic AI security skills with the GitHub Secure Code Game
Zero Day Initiative
The April 2026 Security Update Review