2026-04-15
Microsoft Security
Incident response for AI: Same fire, different fuel
Black Hills Info Sec
Signed, Trusted, and Abused: Proxy Execution via WebView2
Cloudflare
Add voice to your agent
Cloudflare
Browser Run: give your agents a browser
Searchlight Cyber
Vulnerability Management: How to Prioritize Real Threats Over Noise
Dark Reading
Microsoft, Salesforce Patch AI Agent Data Leak Flaws
Schneier on Security
Defense in Depth, Medieval Style
Talos Intelligence
The n8n n8mare: How threat actors are misusing AI workflow automation
Searchlight Cyber
April 14th – This Week’s Top Cybersecurity and Dark Web Stories
CrankySec
Smash the glass wing
2026-04-14
Rapid7
Patch Tuesday - April 2026
Krebs on Security
Patch Tuesday, April 2026 Edition
The Citizen Lab
Beijing Codifies Repression of Overseas Activists
Talos Intelligence
Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities
Ars Technica Security
UK gov's Mythos AI tests help separate cybersecurity threat from hype
Github Security Blog
Hack the AI agent: Build agentic AI security skills with the GitHub Secure Code Game
Zero Day Initiative
The April 2026 Security Update Review
Schneier on Security
Upcoming Speaking Engagements
Github Security Blog
How exposed is your code? Find out in minutes—for free
Talos Intelligence
State-sponsored threats: Different objectives, similar access paths
Cloudflare
Secure private networking for everyone: users, nodes, agents, Workers — introducing Cloudflare Mesh
Bishop Fox Security
Anthropic’s Claude Mythos Preview: The AI Cybersecurity Inflection Point
Schneier on Security
How Hackers Are Thinking About AI
Compass Security Blog
Common Entra ID Security Assessment Findings – Part 4: Weak Conditional Access Policies
Troy Hunt
Weekly Update 499
ISC SANS
ISC Stormcast For Tuesday, April 14th, 2026 https://isc.sans.edu/podcastdetail/9890, (Tue, Apr 14th)
Elastic Security Labs
Phantom in the vault: Obsidian abused to deliver PhantomPulse RAT
Sansec Threat Research
Over 200 PrestaShop stores expose installer, allowing full takeover
2026-04-13
Schneier on Security
On Anthropic’s Mythos Preview and Project Glasswing
Cloudflare
Building a CLI for all of Cloudflare
Project Black
LibreNMS < 26.3.0 Authenticated RCE & XSS
Schneier on Security
AI Chatbots and Trust
Malwarebytes
A week in security (April 6 – April 12)
ISC SANS
ISC Stormcast For Monday, April 13th, 2026 https://isc.sans.edu/podcastdetail/9888, (Mon, Apr 13th)
Rosecurify
Seclog - #173
2026-04-12
Cloudflare
Welcome to Agents Week
Step Security
Introducing StepSecurity Dev Machine Guard: Protecting Developer Machines from Supply Chain Attacks
Step Security
Top 2024 Predictions for CI/CD Security
MaskRay's Blog
Recent lld/ELF performance improvements
2026-04-10
Schneier on Security
Friday Squid Blogging: Squid Overfishing in the South Pacific
Dark Reading
Hims Breach Exposes the Most Sensitive Kinds of PHI
Dark Reading
Your Next Breach Will Look Like Business as Usual
Dark Reading
FINRA Launches Financial Intelligence Fusion Center to Combat Cybersecurity and Fraud Threats
Talos Intelligence
[Video] The TTP Ep. 22: The Collapse of the Patch Window
Google Security Blog
Bringing Rust to the Pixel Baseband
Malwarebytes
ClickFix finds a new way to infect Macs
Schneier on Security
Sen. Sanders Talks to Claude About AI and Privacy
Sansec Threat Research
ClickFix malware hits DoD cybersecurity vendor homepage
Datadog HQ
Introducing our open source AI-native SAST
2026-04-09
Step Security
@velora-dex/sdk Compromised on npm: Malicious Version Drops macOS Backdoor via launchctl Persistence
Step Security
Behind the Scenes: How StepSecurity Detected and Helped Remediate the Largest npm Supply Chain Attack
Step Security
10 Layers Deep: How StepSecurity Stops TeamPCP's Trivy Supply Chain Attack on GitHub Actions
Step Security
Dev Machine Guard Is Now Open Source: See What's Really Running on Your Developer Machine
Step Security
hackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actions - Microsoft, DataDog, and CNCF Projects Hit So Far
Step Security
StepSecurity’s Unified Protection Across the SDLC Infrastructure Threat Framework (SITF)
Bishop Fox Security
Inside Cirro: Attack Paths, Cloud Graphs, and Extensible Schemas
Microsoft Security
The agentic SOC—Rethinking SecOps for the next decade
Talos Intelligence
The threat hunter’s gambit
Google Security Blog
Protecting Cookies with Device Bound Session Credentials
Red Siege InfoSec Blog
When All Else Fails: PowerShell Reflective Assembly Loading
Red Siege InfoSec Blog
Tool – EyeWitness
Microsoft Security
Intent redirection vulnerability in third-party SDK exposed millions of Android wallets to potential risk
Trail of Bits
Master C and C++ with our new Testing Handbook chapter
Schneier on Security
On Microsoft’s Lousy Cloud Security
Talos Intelligence
From the field to the report and back again: How incident responders can use the Year in Review
ISC SANS
ISC Stormcast For Thursday, April 9th, 2026 https://isc.sans.edu/podcastdetail/9886, (Thu, Apr 9th)
Elastic Security Labs
Elastic on Defence Cyber Marvel 2026: A Technical overview from the Exercise Floor
Infernux Blog
Update: Log Horizon
2026-04-08
Ars Technica Security
Iran-linked hackers disrupt operations at US critical infrastructure sites
Meta Security
Trust But Canary: Configuration Safety at Scale