2026-04-09
Step Security
Top 2024 Predictions for CI/CD Security
Microsoft Security
The agentic SOC—Rethinking SecOps for the next decade
Step Security
Dev Machine Guard Is Now Open Source: See What's Really Running on Your Developer Machine
Talos Intelligence
The threat hunter’s gambit
Step Security
hackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actions - Microsoft, DataDog, and CNCF Projects Hit So Far
Step Security
StepSecurity’s Unified Protection Across the SDLC Infrastructure Threat Framework (SITF)
Google Security Blog
Protecting Cookies with Device Bound Session Credentials
Microsoft Security
Intent redirection vulnerability in third-party SDK exposed millions of Android wallets to potential risk
Trail of Bits
Master C and C++ with our new Testing Handbook chapter
Schneier on Security
On Microsoft’s Lousy Cloud Security
Talos Intelligence
From the field to the report and back again: How incident responders can use the Year in Review
Step Security
@velora-dex/sdk Compromised on npm: Malicious Version Drops macOS Backdoor via launchctl Persistence
ISC SANS
ISC Stormcast For Thursday, April 9th, 2026 https://isc.sans.edu/podcastdetail/9886, (Thu, Apr 9th)
Elastic Security Labs
Elastic on Defence Cyber Marvel 2026: A Technical overview from the Exercise Floor
Infernux Blog
Update: Log Horizon
2026-04-08
Ars Technica Security
Iran-linked hackers disrupt operations at US critical infrastructure sites
Meta Security
Trust But Canary: Configuration Safety at Scale
Zero Day Initiative
Node.js Trust Falls: Dangerous Module Resolution on Windows
Dark Reading
Fraud Rockets Higher in Mobile-First Latin America
Dark Reading
Full Sail University to Open IBM Cyber Defense Range Powered by AWS and Cloud Range on Campus
Searchlight Cyber
The True Cost of a Ransomware Attack in 2026
Dark Reading
Niobium Introduces The Fog
Dark Reading
Pluralsight Launches SecureReady to Help Organizations Build Job-Ready Cybersecurity Teams
Palo Alto Networks
Announcing ADEM Universal Agent
Black Hills Info Sec
Getting Started In Pentesting – Advice From The BHIS Pentest Lead
The Citizen Lab
Submission to the UN Working Group on the Use of Mercenaries
Searchlight Cyber
What Are the Four Ways CTEM Fails Without ASM?
Searchlight Cyber
April 7th – This Week’s Top Cybersecurity and Dark Web Stories
Ars Technica Security
Thousands of consumer routers hacked by Russia's military
Schneier on Security
Python Supply-Chain Compromise
Security Cafe
When AI Understands Code: Prompt Injection to RCE
Talos Intelligence
New Lua-based malware “LucidRook” observed in targeted attacks against Taiwanese organizations
Searchlight Cyber
How Do You Build An Attack Surface Management Program?
Embrace The Red
Given Enough Agents, All Bugs Become Shallow
ISC SANS
ISC Stormcast For Wednesday, April 8th, 2026 https://isc.sans.edu/podcastdetail/9884, (Wed, Apr 8th)
CrankySec
A New New Hope
2026-04-07
Eclypsium
BTS #71 - What Makes a Device a Router?
Palo Alto Networks
Palo Alto Networks at Nutanix .NEXT 2026
Amazon Security
Building AI defenses at scale: Before the threats emerge
Schneier on Security
Cybersecurity in the Age of Instant Software
Krebs on Security
Russia Hacked Routers to Steal Microsoft Office Tokens
Dark Reading
Lies, Damned Lies, and Cybersecurity Metrics
Microsoft Security
SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks
Rapid7
A First Look at Our Speaker Lineup and Agenda for the Rapid7 2026 Global Cybersecurity Summit
Bishop Fox Security
API Authentication Bypass in FortiClient EMS 7.4.5-7.4.6–CVE-2026-35616
Talos Intelligence
Talos Takes: 2025's ransomware trends and zombie vulnerabilities
Searchlight Cyber
Your Complete Guide to Continuous Threat Exposure Management
Talos Intelligence
The Trojan horse of cybercrime: Weaponizing SaaS notification pipelines
Talos Intelligence
Year in Review: Vulnerabilities old and new and something React2
Schneier on Security
Hong Kong Police Can Force You to Reveal Your Encryption Keys
Compass Security Blog
Common Entra ID Security Assessment Findings – Part 3: Weak Privileged Identity Management Configuration
ISC SANS
ISC Stormcast For Tuesday, April 7th, 2026 https://isc.sans.edu/podcastdetail/9882, (Tue, Apr 7th)
Troy Hunt
Weekly Update 498
Datadog HQ
Introducing the Datadog Code Security MCP
Sansec Threat Research
SVG Onload Tag Hides Magecart Skimmer on 99 Stores
2026-04-06
Dark Reading
AI-Assisted Supply Chain Attack Targets GitHub
Schneier on Security
New Mexico’s Meta Ruling and Encryption
Step Security
Behind the Scenes: How StepSecurity Detected and Helped Remediate the Largest npm Supply Chain Attack
Microsoft Security
Inside an AI‑enabled device code phishing campaign
Microsoft Security
Storm-1175 focuses gaze on vulnerable web-facing assets in high-tempo Medusa ransomware operations
Bishop Fox Security
Delivered by Trust: What the Axios Supply Chain Attack Means for Security Leaders
Dark Reading
Shadow AI in Healthcare Is Here to Stay
Black Lantern Security
Artificial Foolishness: The Hidden Dangers of External-Facing LLMs
Schneier on Security
Google Wants to Transition to Post-Quantum Cryptography by 2029
Malwarebytes
A week in security (March 30 – April 5)
Krebs on Security
Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab
ISC SANS
ISC Stormcast For Monday, April 6th, 2026 https://isc.sans.edu/podcastdetail/9880, (Mon, Apr 6th)
Rosecurify
Seclog - #172
Infernux Blog
Building a practical log baseline
2026-04-04
Amazon Security
Introducing the Landing Zone Accelerator on AWS Universal Configuration and LZA Compliance Workbook
Elastic Security Labs
Elastic Security Integrations Roundup: Q1 2026
2026-04-03
Schneier on Security
Friday Squid Blogging: Jurassic Fish Chokes on Squid
Ars Technica Security
OpenClaw gives users yet another reason to be freaked out about security
Escape DAST
Everything I Learned About Harness Engineering and AI Factories in San Francisco (April 2026)
Talos Intelligence
Do not get high(jacked) off your own supply (chain)
Dark Reading
Apple Breaks Precedent, Patches DarkSword for iOS 18
Talos Intelligence
Axios NPM supply chain incident
Schneier on Security
Company that Secretly Records and Publishes Zoom Meetings
Trail of Bits
Simplifying MBA obfuscation with CoBRA
Step Security
10 Layers Deep: How StepSecurity Stops TeamPCP's Trivy Supply Chain Attack on GitHub Actions